<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=3018339815089949&amp;ev=PageView&amp;noscript=1">

The ACCENT Learning Hub

The IT Services & Cyber Security Education Center

The most educational business technology blog for Southern California executives, featuring insider tips, articles, and videos on how to get the best IT results.

Blog Feature

Cyber Security

Best Password Managers for Small and Middle Market Businesses [2022]

By: Courtney Casey
June 15th, 2022

When a high-profile password hack makes the news, it’s disconcerting, to say the least. And more often than not, when the passwords are revealed, they couldn’t be more obvious. Things like: password123, iloveyou, qwerty, or 123456. (If that just hit a little too close to home, you should go change your passwords right now).

Read More

Share

Blog Feature

Cyber Security

Cyber Security KPIs: How Do You Know if Your Security Strategy is Working?

By: Vincent Weppner
June 3rd, 2022

It can be difficult to measure the value you’re getting from your investment in cyber security because you may not really notice that it’s working until you have an intruder. At the same time, business leaders ask for cyber security KPIs so they can justify the expense. So how do you measure something that is designed to keep you safe?

Read More

Share

Learn how to develop an IT strategy book chapter

Do IT Right: It's Not About The Computers

Optimize your business's IT function, understand proper - and cost effective - IT staffing, and learn from the mistakes others have made.

Blog Feature

Cyber Security

Cyber Security is a Shared Responsibility

By: Courtney Casey
May 20th, 2022

Cyber security sounds like something that falls under the responsibility of the IT department. IT may handle many of the responsibilities that go along with protecting your company from cyber threats, but that doesn’t make security the sole responsibility of the IT department. Ensuring that your business doesn’t fall prey to a cyber attack is everyone’s responsibility.

Read More

Share

Blog Feature

Cyber Security | Managed Security Services

10 Questions to Ask When You’re Choosing a Cyber Security Assessment Provider

By: Courtney Casey
May 12th, 2022

When you need a cyber security assessment, the company that you choose to do the work matters. It matters because you don’t just want a provider who’s going to deploy some tools that will create a report. You need to choose a company that has expertise in interpreting the results so that your next step can be planning a course of action to close the gaps that are uncovered.

Read More

Share

Blog Feature

Cyber Security

Top 10 Tips for Choosing an Outsourced Cyber Security Company

By: Courtney Casey
April 19th, 2022

There are many reasons why you’re considering using outsourced cyber security services. Perhaps you want to augment your internal IT team, it may have become evident that your current IT provider doesn’t have the security expertise that you need – or worse, you’ve experienced a cyber incident. Whatever your situation, once you’ve decided to weigh your options, you need to be able to evaluate what each provider offers before you can pick the right one for your business. Unfortunately, it’s not going to be an apples-to-apples type of analysis because each provider has their own recipe for service delivery.

Read More

Share

Blog Feature

Cyber Security

5 Takeaways from the Mailchimp Data Breach

By: Courtney Casey
April 14th, 2022

Email and marketing services provider, Mailchimp, discovered in March 2022 that a data breach had occurred. Mailchimp, owned by Intuit, has over 11 million customers worldwide but the data breach was confined to a very small number of customers who were targeted because they provided access to cryptocurrency accounts.

Read More

Share

Blog Feature

Cyber Security

Penetration Testing vs. Vulnerability Scanning: Which is Better?

By: Barry Cavener
April 12th, 2022

You see it in the news daily – another company has fallen victim to a cyber attack. As a business leader, you know it’s possible that a cyber attack could impact your company too, and that you need to take the necessary security precautions to keep your data safe. Yet when you look at your cyber security stature, you might find that you’re missing some essential cyber security layers – two of which are penetration testing and vulnerability scanning. These tests look for the holes in your network that an attacker can exploit. Both have their benefits. Which one is right for your business? Do you need both?

Read More

Share

Blog Feature

Cyber Security | Managed Security Services

Can I Outsource Cyber Security and Keep Our Internal IT Team?

By: Courtney Casey
April 7th, 2022

A question that surfaces when business leaders are aware that they need to pump up their cyber security posture is – Can we augment our internal IT team with outsourced cyber security?  The answer is “yes,” and it can be the solution to not only improve security but to enable everyone in the IT department to be more successful, as well as secure.

Read More

Share

Blog Feature

Cyber Security | Managed Security Services

vCISO: The New Leadership Role Your Small Business Needs

By: Courtney Casey
April 5th, 2022

Add another chair to your conference room table because there’s someone who needs a spot at your leadership meetings. It’s your virtual Chief Information Security Officer (vCISO). While they may not literally sit in on your meetings, their input is vital for executive decisions that pertain to managing cyber risk because they provide guidance and oversight for your cybersecurity strategy.

Read More

Share

Blog Feature

Cyber Security

How Much Do Managed Cyber Security Services Cost?

By: Courtney Casey
March 22nd, 2022

What’s your idea of cyber security? That’s the very first question that you should ask yourself when you start shopping around for managed cyber security services. The next question you should ask is – Why do we need cyber security?  Believe it or not, the answers to those questions are NOT the same for everyone.

Read More

Share