<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=573132769549581&amp;ev=PageView&amp;noscript=1">

The IT Support Education Center

The most educational business technology blog for Southern California executives, featuring insider tips, articles, and videos on how to get the best IT results.

Blog Feature

Cyber Security

October is National Cyber Security Awareness Month

By: Courtney Casey
October 15th, 2020

When you buy a new device and connect it to the internet, do you think about security? If you’re like most people, your answer is “no” and that’s the reason why this year’s focus for National Cyber Security Awareness Month (NCSAM) is all about the security of connected devices. The objective of this annual campaign, started in 2003 through a collaboration between the U.S. Department of Homeland Security and the National Cyber Security Alliance (NCSA), is to increase attention on individual responsibility for security when using the internet, and the theme for 2020 is “Do Your Part. #BeCyberSmart.”

Read More

Share

Blog Feature

Cyber Security | Tech Girl

5 Simple Cyber Security Tips Every Business Can Implement to Be More Secure Today

By: Courtney Casey
October 9th, 2020

As a business owner or executive, you’re probably investing in some high-tech IT security measures to keep your company’s data safe and out of the wrong hands. What about the simple, low-tech cyber security steps? Unfortunately, sometimes people overlook the simple things they can to do to mitigate the risk of someone getting hold of something that they shouldn’t.

Read More

Share

Learn how to develop an IT strategy book chapter

Do IT Right: It's Not About The Computers

Optimize your business's IT function, understand proper - and cost effective - IT staffing, and learn from the mistakes others have made.

Blog Feature

Cyber Security

Top 5 Ways Businesses Can Prevent the Most Common Cyber Security Threats

By: Peter O'Campo
September 23rd, 2020

What would you do if you got an email saying your Netflix account was canceled? “Nooooo!” might be the normal reaction, especially now when we’re all spending more time at home. Now imagine that the email tells you that you have to re-submit your billing information. You click. You type. You submit with your info and…you just gave a hacker your credit card number. That’s just one scam that’s making the rounds. As if businesses didn’t already have enough to deal with, online security threats continue to grow and are more prevalent than ever. The FBI reports an astounding 300% increase in the number of reported cybercrimes since COVID-19 hit the US in March. Here at Accent, we’ve seen an increase in cyber attacks first-hand, especially in phishing.

Read More

Share

Blog Feature

Cyber Security | Managed Security Services

What is a Managed Firewall and How Much Does a Managed Firewall Cost?

By: Shantae' Hansen
September 15th, 2020

Imagine that you had a bouncer at the door of your network inspecting all the traffic that wanted to enter. That's what your firewall does. You may not think about your firewall every day, but it's a key layer of your cyber defenses that you need to keep your people, data, and network safe. There are numerous manufacturers and models of firewalls that you can choose from, but if you have the option to lease one from your IT services provider, having a managed firewall might be a better option.

Read More

Share

Blog Feature

Cyber Security

Top 5 Places Businesses Should Use Multi-Factor Authentication

By: Peter O'Campo
September 3rd, 2020

Hackers use sophisticated tools and methods to get access to your information. This can include social engineering and phishing attacks to get access to your systems, or by hacking third-party sites where you enter your credentials. (A major reason not to use the same password for multiple sites). Everyone wants easy access to their files, email, applications, and computer, but that seamless experience can pose a risk.

Read More

Share

Blog Feature

Cyber Security | Network Security

Replacing Your WatchGuard XTM Firewall: How You Benefit When We Standardize

By: Courtney Casey
August 31st, 2020

WatchGuard XTM firewalls are being phased out and if you have one, you’re going to have to replace yours soon. Evaluating your options can be overwhelming with the number of manufacturers and models of firewalls that are available. How do you know which one will best fit your needs?

Read More

Share

Blog Feature

Technology Planning | Cyber Security

Acceptable Use Policy: What Is It, What's Included and Why Is It Important for Businesses?

By: Courtney Casey
August 26th, 2020

Technology is a vital aspect of society and involved in nearly every type of industry and business today. It's hard for most people to go for an hour, let alone a day, without looking at their cellphones. Although the digital explosion has been great for connecting anytime, anywhere, there are inherent security risks involved with technology.

Read More

Share

Blog Feature

Cyber Security

Multi-Factor Authentication (MFA) Options for Businesses: What They Do, How They Work, and How Much They Cost

By: Peter O'Campo
August 25th, 2020

Imagine this – one of your employees clicks on an email phishing scam that leads them to a very real looking login page for Microsoft 365. They enter their login information, giving a cybercriminal the credentials they need to access your company’s email. The employee thinks the extra login was a fluke and continues with their day. Meanwhile, the cybercriminal logs into your email system and lies in wait.

Read More

Share

Blog Feature

Executive Insights | Cyber Security | Remote Work

What Does Recovery Look Like?

By: Marty Kaufman
July 29th, 2020

If you’re like most of us, you’re sitting at your desk wondering what’s next.  The pandemic has caused so much uncertainty. Most business leaders are used to planning and making things happen. It’s what gets you into business in the first place! The United States is a great place for business-minded entrepreneurial types to have a vision, make some plans, and execute -- at least until March 2020. Now that 4 months have passed and a clear end to the situation is still not in sight, what will the next 6-12 months look like?

Read More

Share

Blog Feature

Cyber Security

6 Common WordPress Vulnerabilities

By: Courtney Casey
June 15th, 2020

It's no surprise to hear that WordPress is the single most hacked website platform on the internet. Considering that WordPress sites make up about one-third of websites, you might even think this is a normal statistical fact, but it's not. Time and time again, dozens to thousands of sites are exposed to hackers and actively hacked, not because WordPress sites are a common target, but because WordPress sites are unbelievably easy to hack.

Read More

Share