<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=573132769549581&amp;ev=PageView&amp;noscript=1">

The ACCENT Learning Hub

The IT Support Learning Hub

The most educational business technology blog for Southern California executives, featuring insider tips, articles, and videos on how to get the best IT results.

Blog Feature

Cyber Security | Tech Girl

Your IT Support Provider's Role in Regulatory Compliance

By: Courtney Casey
December 16th, 2019

These days, more and more companies are being required to comply with regulations for security, even if they're not in a regulated industry. Specifications for NIST compliance, to name one, are flowing down the supply chain and in order to continue to do business with your customers, you may be required to prove compliance with their security standards.

Read More

Share

Blog Feature

IT Costs | Tech Girl

Can IT Support Contract Costs Be Reduced?

By: Courtney Casey
December 4th, 2019

Every business wants to reduce its costs. Over the years, I’ve talked to hundreds of Southern California business executives and many of them are concerned about what they’re paying for IT Support Agreements. The conversation goes in one of two directions: either their provider is doing a good job, so they feel like it must be easy, or they aren’t doing a good job and the executive feels like they’re paying a lot for little gain. If you’re happy with your current IT services vendor but it seems like your costs are going up, it’s natural to evaluate where your money is going, and to look for ways to bring expenses down. Is there a way to reduce IT support contract, or IT services agreement, costs? Here are a few things to dig into to answer that question.

Read More

Share

Learn how to develop an IT strategy book chapter

Do IT Right: It's Not About The Computers

Optimize your business's IT function, understand proper - and cost effective - IT staffing, and learn from the mistakes others have made.

Blog Feature

IT Support FAQs | Technology Planning | Better IT Results | Tech Girl

Types of Outsourced IT Support Services: Which Model is Best for Your Business?

By: Courtney Casey
November 18th, 2019

Whether your company has 15 employees or 50,000, it is imperative that your technology consistently works how it’s supposed to. You need a clear vision of where technology is going in your business, and you need to get rid of roadblocks that are holding the company back from achieving its goals.

Read More

Share

Blog Feature

Cyber Security | Tech Girl

Should Business Owners Phish Their Employees?

By: Courtney Casey
October 16th, 2019

We’re living in a time where cybercrime and ransomware attacks are announced like the next big box office hit. They’re making an impact worldwide, and it’s causing many businesses to suffer downtime, loss of business, and increased costs to recover from attacks. One of the most common types of scams affecting businesses is referred to as phishing. Phishing attacks are generally emails that entice users to perform an action, like clicking a link to an infected webpage, opening a malicious attachment, or even wiring money.

Read More

Share

Blog Feature

Tech Girl | Business Technology

How to Set Up a Professional On-Hold Recording for Your Business Phone System

By: Courtney Casey
September 11th, 2019

Technology gives us the ability to market our businesses in many ways. One way that has been around for decades is the “on-hold” recording for your phone system. It’s one of the most underappreciated methods for showcasing your company and making sure callers have a good experience.

Read More

Share

Blog Feature

Cyber Security | Tech Girl

3 Commonly Overlooked Ways to Keep Your Personal Information Safe from Online Threats

By: Courtney Casey
June 13th, 2019

Cybercrime and ransomware attacks have become commonplace in society today. The impact is worldwide, causing headaches and financial troubles for many businesses and consumers. So, how do you stay safe from these threats? Here are a few tips to keep your personal information out of the wrong hands.

Read More

Share

Blog Feature

Cyber Security | Tech Girl

Getting Hacked Isn't Normal

By: Courtney Casey
April 30th, 2019

I got an email the other day from a friend in one of my networking groups. The subject line read, “Please sign - You have received a secure document via DocuSign.” Alarm bells went off in my mind because I was not expecting an email like this from her. Further investigation revealed that this was a “phishing” email – a kind of scam where unscrupulous individuals try to capture information by pretending they’re someone they are not.

Read More

Share

Blog Feature

Better IT Results | Tech Girl

The Difference Between Data Backup, Disaster Recovery, and Business Continuity

By: Courtney Casey
January 15th, 2019

I’m sure you’ve heard the terms “backup,” “disaster recovery,” and “business continuity.” What most business owners do not realize is that these are three separate things and without all three pieces, their business is in a vulnerable position. Data Backup First off, data backup is just copying your data onto another device. This could be a tape drive, an external hard drive, or an offsite backup. In most of these forms, your data is being stored in a raw format. This means that your applications, configurations, and network settings are not being backed up with it, so if you needed to restore, or recover, your network from the data backup, you may be down for days or weeks.

Read More

Share

Blog Feature

Business Planning | Better IT Results | Tech Girl

Six Business Technology Problems to Solve This Year

By: Courtney Casey
January 10th, 2019

Did you make any new year's resolutions as the calendar turned over to 2019? In addition to the usual personal resolutions, such as eating healthy and spending more time with family, I encourage business owners and managers to add a few business resolutions to their list. Information technology is critical to operations for most companies and has the power to stop, or at least disrupt, business if things aren’t going well. When utilized properly, information technology can give companies a strategic advantage and help them accomplish their business goals and objectives.

Read More

Share

Blog Feature

Tech Girl

How to Keep Your Data Safe & Business Running During California's Fire Season

By: Courtney Casey
November 28th, 2018

It’s that time of year in California. Dry brush and Santa Ana winds put thousands of lives, homes, and businesses at risk. The recent fires remind us that wildfires can start any time and they make quick work of any area, destroying everything in their path.

Read More

Share