<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=573132769549581&amp;ev=PageView&amp;noscript=1">

The ACCENT Learning Hub

The IT Support Learning Hub

The most educational business technology blog for Southern California executives, featuring insider tips, articles, and videos on how to get the best IT results.

Blog Feature

Cyber Security

5 Reasons to Use the NIST Cyber Security Framework

By: Courtney Casey
January 14th, 2020

If you manufacture one little part for a piece of military equipment for the US government, very soon - if not already -  you’re going to be required to verify that you’re compliant with the NIST Cyber Security Framework. It might not be surprising to learn that the government is tightening up cyber security throughout their supply chain, but organizations that aren’t part of a government supply chain are also adopting the framework. The reasons may be a little different for each organization but the outcome is similar - they become better managers of cyber risk.

Read More

Share

Blog Feature

Cyber Security

NIST Guidelines Make Passwords Easier to Remember but Hard to Crack

By: Courtney Casey
January 6th, 2020

The lock on your front door isn’t going to keep intruders out unless you make a habit of using it. The same is true for the digital locks on your data and IT systems. Strong passwords continue to provide a solid defense against hackers, but password management guidelines within the NIST Cyber Security Framework have changed.

Read More

Share

Learn how to develop an IT strategy book chapter

Do IT Right: It's Not About The Computers

Optimize your business's IT function, understand proper - and cost effective - IT staffing, and learn from the mistakes others have made.

Blog Feature

Cyber Security | Tech Girl

Your IT Support Provider's Role in Regulatory Compliance

By: Courtney Casey
December 16th, 2019

These days, more and more companies are being required to comply with regulations for security, even if they're not in a regulated industry. Specifications for NIST compliance, to name one, are flowing down the supply chain and in order to continue to do business with your customers, you may be required to prove compliance with their security standards.

Read More

Share

Blog Feature

Cyber Security | The IT Help Desk | Tech Tips & Trends

5 Password Policy Guidelines for Small to Mid-Size Businesses

By: Courtney Casey
November 4th, 2019

Microsoft research shows that 90% of all compromised passwords come from a data breach. You read that right - 90%! Criminals use tools that can guess thousands of passwords a minute. Their goal is to wreak havoc on your network and steal your trade secrets. But, not all these criminals are hacking masterminds. These attacks can also be a result of a coworker or family member snooping around.

Read More

Share

Blog Feature

Cyber Security

How to Give Vendors Network Access Without Compromising Security

By: Courtney Casey
October 28th, 2019

The Internet has changed how we do business, and along with everything else that your IT department does, they have the challenge of keeping your network safe. With the growing number of cyber threats combined with the increasing amount of data companies are storing today, the job of IT security has become complex, and some risky situations, like giving vendors access to your network, can get overlooked.

Read More

Share

Blog Feature

Cyber Security

Social Engineering & IT Security: What Businesses Need To Know

By: Courtney Casey
October 23rd, 2019

Every day we’re presented with news of the “next big thing.” Disruptive technology developed by some of the most resourceful minds of our time has created tremendous value for companies. These revolutionary tools, which have completely changed the ways we work and play, are simply powerful. The problem is that power isn’t always a good thing. In 1771, British-Irish statesman Edmund Burke said, “The greater the power, the more dangerous the abuse.” While his subject at the time had more to do with politics than technology, the statement holds the same truth today as it did then.

Read More

Share

Blog Feature

Cyber Security

3 Big Reasons Why Your IT Department Needs Outsourced Cyber Security Services

By: Courtney Casey
October 21st, 2019

If you knew that there was an increase in crime in your neighborhood, would you do something about it? Of course, you would. You would make sure that all the doors and windows to your house were locked. You might even beef up your defenses and purchase a security system just to get peace of mind that your family and property are safe.

Read More

Share

Blog Feature

Cyber Security | Tech Girl

Should Business Owners Phish Their Employees?

By: Courtney Casey
October 16th, 2019

We’re living in a time where cybercrime and ransomware attacks are announced like the next big box office hit. They’re making an impact worldwide, and it’s causing many businesses to suffer downtime, loss of business, and increased costs to recover from attacks. One of the most common types of scams affecting businesses is referred to as phishing. Phishing attacks are generally emails that entice users to perform an action, like clicking a link to an infected webpage, opening a malicious attachment, or even wiring money.

Read More

Share

Blog Feature

Cyber Security

Help! We Need NIST Cyber Security Compliance

By: Courtney Casey
October 9th, 2019

It’s not uncommon for your customers to give you specifications about how they want to do business with you. These specs increasingly include cyber security expectations, specifically compliance with the NIST(1) Cyber Security Framework. What should you do if someone with whom you do business places this requirement on you? Here’s what you need to know.

Read More

Share

Blog Feature

Cyber Security

October is National Cyber Security Awareness Month

By: Courtney Casey
October 2nd, 2019

Think back to what your life was like 16 years ago. The year was 2003. Were you thinking about cyber security back then? Probably not, but that was when National Cyber Security Awareness Month (NCSAM) was started through a collaboration between the U.S. Department of Homeland Security and the National Cyber Security Alliance (NCSA). In 2019 cyber security is more important than ever and this year’s awareness theme focuses on personal accountability.

Read More

Share