<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=573132769549581&amp;ev=PageView&amp;noscript=1">

The ACCENT Learning Hub

The IT Support Education Center

The most educational business technology blog for Southern California executives, featuring insider tips, articles, and videos on how to get the best IT results.

Blog Feature

Cyber Security | Managed Security Services

What is a Managed Firewall and How Much Does a Managed Firewall Cost?

By: Shantae' Hansen
September 15th, 2020

Imagine that you had a bouncer at the door of your network inspecting all the traffic that wanted to enter. That's what your firewall does. You may not think about your firewall every day, but it's a key layer of your cyber defenses that you need to keep your people, data, and network safe. There are numerous manufacturers and models of firewalls that you can choose from, but if you have the option to lease one from your IT services provider, having a managed firewall might be a better option.

Read More

Share

Blog Feature

Cyber Security

Top 5 Places Businesses Should Use Multi-Factor Authentication

By: Peter O'Campo
September 3rd, 2020

Hackers use sophisticated tools and methods to get access to your information. This can include social engineering and phishing attacks to get access to your systems, or by hacking third-party sites where you enter your credentials. (A major reason not to use the same password for multiple sites). Everyone wants easy access to their files, email, applications, and computer, but that seamless experience can pose a risk.

Read More

Share

Learn how to develop an IT strategy book chapter

Do IT Right: It's Not About The Computers

Optimize your business's IT function, understand proper - and cost effective - IT staffing, and learn from the mistakes others have made.

Blog Feature

Cyber Security | Network Security

Replacing Your WatchGuard XTM Firewall: How You Benefit When We Standardize

By: Courtney Casey
August 31st, 2020

WatchGuard XTM firewalls are being phased out and if you have one, you’re going to have to replace yours soon. Evaluating your options can be overwhelming with the number of manufacturers and models of firewalls that are available. How do you know which one will best fit your needs?

Read More

Share

Blog Feature

Technology Planning | Cyber Security

Acceptable Use Policy: What Is It, What's Included and Why Is It Important for Businesses?

By: Courtney Casey
August 26th, 2020

Technology is a vital aspect of society and involved in nearly every type of industry and business today. It's hard for most people to go for an hour, let alone a day, without looking at their cellphones. Although the digital explosion has been great for connecting anytime, anywhere, there are inherent security risks involved with technology.

Read More

Share

Blog Feature

Cyber Security

Multi-Factor Authentication (MFA) Options for Businesses: What They Do, How They Work, and How Much They Cost

By: Peter O'Campo
August 25th, 2020

Imagine this – one of your employees clicks on an email phishing scam that leads them to a very real looking login page for Microsoft 365. They enter their login information, giving a cybercriminal the credentials they need to access your company’s email. The employee thinks the extra login was a fluke and continues with their day. Meanwhile, the cybercriminal logs into your email system and lies in wait.

Read More

Share

Blog Feature

Executive Insights | Cyber Security | Remote Work

What Does Recovery Look Like?

By: Marty Kaufman
July 29th, 2020

If you’re like most of us, you’re sitting at your desk wondering what’s next.  The pandemic has caused so much uncertainty. Most business leaders are used to planning and making things happen. It’s what gets you into business in the first place! The United States is a great place for business-minded entrepreneurial types to have a vision, make some plans, and execute -- at least until March 2020. Now that 4 months have passed and a clear end to the situation is still not in sight, what will the next 6-12 months look like?

Read More

Share

Blog Feature

Cyber Security

6 Common WordPress Vulnerabilities

By: Courtney Casey
June 15th, 2020

It's no surprise to hear that WordPress is the single most hacked website platform on the internet. Considering that WordPress sites make up about one-third of websites, you might even think this is a normal statistical fact, but it's not. Time and time again, dozens to thousands of sites are exposed to hackers and actively hacked, not because WordPress sites are a common target, but because WordPress sites are unbelievably easy to hack.

Read More

Share

Blog Feature

Cyber Security

Train Your Team to Spot High-Stakes Phishing

By: Courtney Casey
June 3rd, 2020

Phishing attacks are growing more sophisticated and spam filters aren't as effective for every kind of attack. Old-style spammers sent the same message to many people, hoping some of them would take the bait. The newer, more dangerous approach targets individuals. It's called spearphishing, whaling, or high-stakes phishing.

Read More

Share

Blog Feature

Cyber Security

Benefits of Anti-Phishing Software for Small Businesses

By: Victoria O'Campo
May 25th, 2020

In the same way that you might bait a hook to reel in while fishing, hackers try to bait individuals and businesses through the method of what is called phishing. This cyber phishing “bait” may not seem as obvious as a sparkling plastic lure on a hook - unless you know what to look for.

Read More

Share

Blog Feature

Cyber Security

Make Personal Browsing Policies Work for Everyone

By: Courtney Casey
May 18th, 2020

Some people live their lives on the internet. When this cuts into work time and creates security risks, employers have to deal with the problem. Depending on what sites employees visit and how much time they spend, browser usage during work time can raise multiple issues. It can impact network bandwidth. Viewing some material where other employees can see could be deemed harassment. Visiting dangerous sites could let malware get into company computers or leak confidential information.

Read More

Share