The IT Support Learning Hub
The most educational business technology blog for Southern California executives, featuring insider tips, articles, and videos on how to get the best IT results.
Now that you're working from home, there are a few security best practices to follow to help make sure you and your company are protected from cyber security threats. For example, have you thought about the security of your home network with all of your "things" connected to it? Don't forget that working securely has as much to do with your actions as it does with your IT environment, so don't let your new work location let down your guard.
You’re gearing up to pick the best outsourced IT company for your business, excited about the potential benefits! But you aren’t 100% sure how to pick the best managed IT services provider. Or maybe you’ve narrowed it down, but now you’re stuck in a dead tie. Accent Computer Solutions, Inc. has been helping companies develop their best IT strategy for over 30 years. A topic that frequently comes up is, “How can I compare IT support companies? What criteria should I evaluate?” Since we talk about it often, we’ve compiled a list to help narrow down your search for the right IT support!
Optimize your business's IT function, understand proper - and cost effective - IT staffing, and learn from the mistakes others have made.
Microsoft research shows that 90% of all compromised passwords come from a data breach. You read that right - 90%! Criminals use tools that can guess thousands of passwords a minute. Their goal is to wreak havoc on your network and steal your trade secrets. But, not all these criminals are hacking masterminds. These attacks can also be a result of a coworker or family member snooping around.
Email communication is a necessity in any organization, which also makes it a breeding ground for cyber attackers. All too often, we hear from executives about concerns that email will become an open door for a data breach or malicious software such as a virus. They ask us, “How can we tighten email security to avoid becoming a victim of these hackers?"
I got a call from a client recently asking, “Why are emails from my customers getting caught in my spam filter instead of sent to my inbox?” Fair question. The emails he was referencing were from a customer that he communicates with all the time. And to make matters worse, he didn’t even know the emails had been sent until a customer called to ask why he hadn’t been responding. He was understandably frustrated.
Have you ever wanted your work days to be a little easier, or to get things done just a little faster? Technology makes us more productive in a lot of cases, but it can also slow us down if we aren’t familiar with the best ways to use it. Luckily, many time-saving features are built-in and easy to use.
Do you have an Alexa or Google Assistant at home? How about a fitness tracker? Does your doorbell have a security camera that lets you know when someone's on your front porch? Will you get an alert if there’s a water leak in your basement? Will your window shades automatically close when the sun reaches a certain intensity? Does your car parallel park by itself? All of these technologies are a part of the Internet of Things (IoT) and, as consumers, we’re jumping on the IoT bandwagon because of the conveniences and new capabilities this emerging technology provides. It’s only natural that we want to utilize IoT technology in our businesses, too. Before you start plugging a myriad of devices into your network, make sure that IoT fits into your IT strategy to ensure it's a good investment.
Want to make sure your smartphones, tablets, and other mobile devices are as secure as possible? Check out this 90-second video tip from Chris, one of Accent’s vCIOs, with 3 tips to secure your mobile devices.
You’ve just typed up your monthly email to your loyal followers and clients and you hit the magic button — send!
Everyone should worry about online safety. This is especially true when it comes to business and personal information, like banking records, payroll, or trade secrets. And while passwords can go a long way, unfortunately, they are getting easier to crack. So, what can you do? How do you protect your business from hackers and cybercriminals running amuck on the internet?