The IT Support Learning Hub
The most educational business technology blog for Southern California executives, featuring insider tips, articles, and videos on how to get the best IT results.
Trying to keep up-to-date on how to stay safe from cyber criminals these days can be nearly impossible. Most have no idea how or where to even begin.
Do you have an Alexa or Google Assistant at home? How about a fitness tracker? Does your doorbell have a security camera that lets you know when someone's on your front porch? Will you get an alert if there’s a water leak in your basement? Will your window shades automatically close when the sun reaches a certain intensity? Does your car parallel park by itself? All of these technologies are a part of the Internet of Things (IoT) and, as consumers, we’re jumping on the IoT bandwagon because of the conveniences and new capabilities this emerging technology provides. It’s only natural that we want to utilize IoT technology in our businesses, too. Before you start plugging a myriad of devices into your network, make sure that IoT fits into your IT strategy to ensure it's a good investment.
Optimize your business's IT function, understand proper - and cost effective - IT staffing, and learn from the mistakes others have made.
I got an email the other day from a friend in one of my networking groups. The subject line read, “Please sign - You have received a secure document via DocuSign.” Alarm bells went off in my mind because I was not expecting an email like this from her. Further investigation revealed that this was a “phishing” email – a kind of scam where unscrupulous individuals try to capture information by pretending they’re someone they are not.
For most of us Jan. 1 to April 15 is just tax season, but for hackers its “prime hunting season” to steal personal and financial information from unsuspecting taxpayers and businesses. Each year, hackers roll out new phishing scams -- fake emails used to acquire sensitive information such as usernames, passwords, financial information, credit card details, etc. They fool the user into clicking links or attachments by posing as a trustworthy source.
In business, information is everything. Without your client database, financial records, documents, or email, serving your customers would be nearly impossible. You need continuous access to your system to keep your business running smoothly. So how do you ensure that your data will be protected against fires, floods, earthquakes, viruses, and human error? It’s all about backup.
The security cameras at your office are recording and transmitting what they see inside and outside your building, but they’re doing something else, too. Their computing power has been harnessed into a botnet slave group that’s in the process of attacking a target website.
A massive technology ride is gaining speed as we get ready to move into 2019, and it’s going to cause a major disruption for those who ignore it. Microsoft has given us a lot of time to get used to the idea that support for some of our favorite desktop and server operating systems will end in early 2020.
Ready or not, Black Friday, the day after Thanksgiving, signals the start of the holiday season and many people will be looking for the best deals online. While you are shopping for the perfect gift and trying the get the lowest prices, the scammers are ready to pounce. They're using the same old tactics they've been using for years, but guess what? They still work.
Accent Computer Solutions, Inc. has been named a top Managed Security Service Provider (MSSP) by Channel Futures, an IT industry organization. The criteria for this designation reflects the company’s aggressive investment in cyber security, as well as a commitment to meeting the needs for IT security and IT management on an ongoing basis.
Want to make sure your smartphones, tablets, and other mobile devices are as secure as possible? Check out this 90-second video tip from Chris, one of Accent’s vCIOs, with 3 tips to secure your mobile devices.