<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=573132769549581&amp;ev=PageView&amp;noscript=1">

The ACCENT Learning Hub

The IT Support Learning Hub

The most educational business technology blog for Southern California executives, featuring insider tips, articles, and videos on how to get the best IT results.

Blog Feature

Cyber Security | The IT Help Desk | Tech Tips & Trends

5 Password Policy Guidelines for Small to Mid-Size Businesses

By: Courtney Casey
November 4th, 2019

Microsoft research shows that 90% of all compromised passwords come from a data breach. You read that right - 90%! Criminals use tools that can guess thousands of passwords a minute. Their goal is to wreak havoc on your network and steal your trade secrets. But, not all these criminals are hacking masterminds. These attacks can also be a result of a coworker or family member snooping around.

Read More

Share

Blog Feature

Cyber Security

How to Give Vendors Network Access Without Compromising Security

By: Courtney Casey
October 28th, 2019

The Internet has changed how we do business, and along with everything else that your IT department does, they have the challenge of keeping your network safe. With the growing number of cyber threats combined with the increasing amount of data companies are storing today, the job of IT security has become complex, and some risky situations, like giving vendors access to your network, can get overlooked.

Read More

Share

Learn how to develop an IT strategy book chapter

Do IT Right: It's Not About The Computers

Optimize your business's IT function, understand proper - and cost effective - IT staffing, and learn from the mistakes others have made.

Blog Feature

Cyber Security

Social Engineering & IT Security: What Businesses Need To Know

By: Courtney Casey
October 23rd, 2019

Every day we’re presented with news of the “next big thing.” Disruptive technology developed by some of the most resourceful minds of our time has created tremendous value for companies. These revolutionary tools, which have completely changed the ways we work and play, are simply powerful. The problem is that power isn’t always a good thing. In 1771, British-Irish statesman Edmund Burke said, “The greater the power, the more dangerous the abuse.” While his subject at the time had more to do with politics than technology, the statement holds the same truth today as it did then.

Read More

Share

Blog Feature

Cyber Security

3 Big Reasons Why Your IT Department Needs Outsourced Cyber Security Services

By: Courtney Casey
October 21st, 2019

If you knew that there was an increase in crime in your neighborhood, would you do something about it? Of course, you would. You would make sure that all the doors and windows to your house were locked. You might even beef up your defenses and purchase a security system just to get peace of mind that your family and property are safe.

Read More

Share

Blog Feature

Cyber Security | Tech Girl

Should Business Owners Phish Their Employees?

By: Courtney Casey
October 16th, 2019

We’re living in a time where cybercrime and ransomware attacks are announced like the next big box office hit. They’re making an impact worldwide, and it’s causing many businesses to suffer downtime, loss of business, and increased costs to recover from attacks. One of the most common types of scams affecting businesses is referred to as phishing. Phishing attacks are generally emails that entice users to perform an action, like clicking a link to an infected webpage, opening a malicious attachment, or even wiring money.

Read More

Share

Blog Feature

Cyber Security

Help! We Need NIST Cyber Security Compliance

By: Courtney Casey
October 9th, 2019

It’s not uncommon for your customers to give you specifications about how they want to do business with you. These specs increasingly include cyber security expectations, specifically compliance with the NIST(1) Cyber Security Framework. What should you do if someone with whom you do business places this requirement on you? Here’s what you need to know.

Read More

Share

Blog Feature

Cyber Security

October is National Cyber Security Awareness Month

By: Courtney Casey
October 2nd, 2019

Think back to what your life was like 16 years ago. The year was 2003. Were you thinking about cyber security back then? Probably not, but that was when National Cyber Security Awareness Month (NCSAM) was started through a collaboration between the U.S. Department of Homeland Security and the National Cyber Security Alliance (NCSA). In 2019 cyber security is more important than ever and this year’s awareness theme focuses on personal accountability.

Read More

Share

Blog Feature

Cyber Security

Remote Access Without VPN is Risky Business

By: Victoria O'Campo
September 26th, 2019

If you have your laptop, you can work from just about anywhere if there’s an internet connection to your company servers. Out on a sales call and need to log in to grab your proposal? Need to get to your email from home? Updating your project timelines while you’re waiting at the airport for your next flight? No problem! No problem unless…

Read More

Share

Blog Feature

Executive Insights | Cyber Security

Cyber Security Awareness: A National Initiative and Pressing Business Concern

By: Marty Kaufman
September 26th, 2019

Did you know that October is National Cybersecurity Awareness Month (NCSAM)? The Department of Homeland Security describes this nationwide initiative as "a collaborative effort between government and industry to raise awareness about the importance of cybersecurity and to ensure that all Americans have the resources they need to be safer and more secure online.”

Read More

Share

Blog Feature

Cyber Security | Training | Tech Tips & Trends

Behavior-Based Training Essential for Email Security

By: Shantae' Hansen
September 18th, 2019

Email communication is a necessity in any organization, which also makes it a breeding ground for cyber attackers. All too often, we hear from executives about concerns that email will become an open door for a data breach or malicious software such as a virus. They ask us, “How can we tighten email security to avoid becoming a victim of these hackers?"

Read More

Share