<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=573132769549581&amp;ev=PageView&amp;noscript=1">

The ACCENT Learning Hub

The IT Support Education Center

The most educational business technology blog for Southern California executives, featuring insider tips, articles, and videos on how to get the best IT results.

Blog Feature

Cyber Security

6 Common WordPress Vulnerabilities

By: Courtney Casey
June 15th, 2020

It's no surprise to hear that WordPress is the single most hacked website platform on the internet. Considering that WordPress sites make up about one-third of websites, you might even think this is a normal statistical fact, but it's not. Time and time again, dozens to thousands of sites are exposed to hackers and actively hacked, not because WordPress sites are a common target, but because WordPress sites are unbelievably easy to hack.

Read More

Share

Blog Feature

Cyber Security

Train Your Team to Spot High-Stakes Phishing

By: Courtney Casey
June 3rd, 2020

Phishing attacks are growing more sophisticated and spam filters aren't as effective for every kind of attack. Old-style spammers sent the same message to many people, hoping some of them would take the bait. The newer, more dangerous approach targets individuals. It's called spearphishing, whaling, or high-stakes phishing.

Read More

Share

Learn how to develop an IT strategy book chapter

Do IT Right: It's Not About The Computers

Optimize your business's IT function, understand proper - and cost effective - IT staffing, and learn from the mistakes others have made.

Blog Feature

Cyber Security

Benefits of Anti-Phishing Software for Small Businesses

By: Victoria O'Campo
May 25th, 2020

In the same way that you might bait a hook to reel in while fishing, hackers try to bait individuals and businesses through the method of what is called phishing. This cyber phishing “bait” may not seem as obvious as a sparkling plastic lure on a hook - unless you know what to look for.

Read More

Share

Blog Feature

Cyber Security

Make Personal Browsing Policies Work for Everyone

By: Courtney Casey
May 18th, 2020

Some people live their lives on the internet. When this cuts into work time and creates security risks, employers have to deal with the problem. Depending on what sites employees visit and how much time they spend, browser usage during work time can raise multiple issues. It can impact network bandwidth. Viewing some material where other employees can see could be deemed harassment. Visiting dangerous sites could let malware get into company computers or leak confidential information.

Read More

Share

Blog Feature

Cyber Security | Remote Work

Stop Letting Remote Workers Use Windows 7

By: Courtney Casey
May 11th, 2020

Millions of Americans began working from home for the first time this March. While some companies had the ability to provide laptops or send office desktops home with them, many more required workers to use personal computers and might have inadvertently created a security vulnerability because their computers are still running Windows 7. The process of loading company software onto so many machines left the operating systems as an afterthought. However, support for Windows 7 ended January 14 and your company is facing major risks if it's still in use, even if you have antivirus and a firewall.

Read More

Share

Blog Feature

Cyber Security

8 Cyber Security Drills You Should Run in 2020

By: Courtney Casey
May 4th, 2020

People don't really know how their cyber security skills are going to measure up until they've tried them. Everyone would prefer never having to face a real-life cyber security incident. It's better if they can try out their skills on simulated threats. They can make mistakes without suffering anything worse than embarrassment. The lessons they learn will help them to deal with real threats when they happen.

Read More

Share

Blog Feature

Technology Planning | Executive Insights | Cyber Security

Where We Go From Here: Building Resilience in Remote Work and Security

By: Marty Kaufman
April 29th, 2020

The month of April has been filled with web meetings and uncertainty.  While we've been advancing our video skills more than we ever thought possible, we’ve also been figuring out how to maneuver through our new circumstances. Like many of you, I have been working hard on getting paperwork together and submitting applications for the Payroll Protection Program. 

Read More

Share

Blog Feature

Cyber Security | Remote Work

Security Concerns Cause Gloom for Zoom

By: Courtney Casey
April 21st, 2020

When Boris Johnson, Prime Minister of the UK, sent out a tweet that included his computer screen showing his first cabinet meeting on Zoom, little did he know that he was helping hackers find their way into his meeting. His monitor clearly showed the meeting ID, and sharing it with the whole world on social media was like giving hackers a key to their conference room.

Read More

Share

Blog Feature

Cyber Security

Top Network Security Risks in 2020 - Part 2

By: Courtney Casey
April 6th, 2020

Welcome back to the second half of our two-part article on the top network security threats of 2020. If you haven't seen part one, jump back to the beginning before diving into part two. 

Read More

Share

Blog Feature

Technology Planning | Executive Insights | Cyber Security

Remote Workers and Security: Staying Safe in Changing Times

By: Marty Kaufman
March 31st, 2020

I don’t even know where to start. If you’d have told me two months ago that we’d be debating over which businesses are “essential” and that millions of Americans would be sent home to work overnight, I would’ve told you you’re crazy. But here we are.

Read More

Share