The IT Support Learning Hub
The most educational business technology blog for Southern California executives, featuring insider tips, articles, and videos on how to get the best IT results.
For most of us Jan. 1 to April 15 is just tax season, but for hackers its “prime hunting season” to steal personal and financial information from unsuspecting taxpayers and businesses. Each year, hackers roll out new phishing scams -- fake emails used to acquire sensitive information such as usernames, passwords, financial information, credit card details, etc. They fool the user into clicking links or attachments by posing as a trustworthy source.
In business, information is everything. Without your client database, financial records, documents, or email, serving your customers would be nearly impossible. You need continuous access to your system to keep your business running smoothly. So how do you ensure that your data will be protected against fires, floods, earthquakes, viruses, and human error? It’s all about backup.
Optimize your business's IT function, understand proper - and cost effective - IT staffing, and learn from the mistakes others have made.
The security cameras at your office are recording and transmitting what they see inside and outside your building, but they’re doing something else, too. Their computing power has been harnessed into a botnet slave group that’s in the process of attacking a target website.
A massive technology ride is gaining speed as we get ready to move into 2019, and it’s going to cause a major disruption for those who ignore it. Microsoft has given us a lot of time to get used to the idea that support for some of our favorite desktop and server operating systems will end in early 2020.
Ready or not, Black Friday, the day after Thanksgiving, signals the start of the holiday season and many people will be looking for the best deals online. While you are shopping for the perfect gift and trying the get the lowest prices, the scammers are ready to pounce. They're using the same old tactics they've been using for years, but guess what? They still work.
Accent Computer Solutions, Inc. has been named a top Managed Security Service Provider (MSSP) by Channel Futures, an IT industry organization. The criteria for this designation reflects the company’s aggressive investment in cyber security, as well as a commitment to meeting the needs for IT security and IT management on an ongoing basis.
Want to make sure your smartphones, tablets, and other mobile devices are as secure as possible? Check out this 90-second video tip from Chris, one of Accent’s vCIOs, with 3 tips to secure your mobile devices.
The best, and arguably the worst, thing about the rapid growth of technology is options. Long gone are the days where chocolate or vanilla were your only choices. In a post-Ben & Jerry’s world of Truffle Kerfuffle and Chubby Hubby, how are you supposed to know what to pick? And maybe the million-plus specialty ice cream flavors out there isn't exactly the same. But it’s easy to feel as overwhelmed by specialty ice cream as when you’re evaluating your server options.
Imagine that you get an invoice from a hospital for $125,000. No doubt you’ll experience sticker shock at the high cost of medical care. But wait a minute. This hospital is in a city that you have never visited, and it’s for a surgery that you never had. How did this happen? You’ve just become another victim of medical fraud. You can now expect to spend a few hundred hours of your life and thousands of dollars of your own money to clean up the mess that a cyber criminal made by stealing and using your medical records.
In a recent blog article, Marty Kaufman recounts the story of meeting with a business owner who was panicked and in crisis mode because of a cyber attack. If we could backtrack to the days, weeks and months before the attack, we would probably find that the business owner did not pay much attention to cyber security at all because he didn’t think that a data breach could happen to him. Well, it could, and it did. We can’t go back in time and undo all the damage that has been done by this cyber attack, but we can help other executives avoid stumbling over some common misconceptions that unknowingly increase cyber risk.