The IT Support Education Center
The most educational business technology blog for Southern California executives, featuring insider tips, articles, and videos on how to get the best IT results.
There’s a new term you should learn if you don't know it already: Business Email Compromise (BEC). It’s a formal way of saying someone’s email was used as a part of a cyber attack. The FBI calls BEC “one of the most financially damaging online crimes” and according to the cyber security awareness training company, KnowBe4, more than 90% of successful data breaches began with an email tactic called phishing. Phishing is an email scam designed to trick your user into doing some kind of action, like clicking a link or downloading a file, to get access to your organization’s network. Email is a prime target for cyber criminals and it continues to be a necessity in business, even though executive concerns about email security are increasing.
As if we didn’t have enough to deal with during a pandemic, cyber criminals have increased their attempts to take over accounts, invade networks, kidnap data, and generally wreak havoc during 2020.
Optimize your business's IT function, understand proper - and cost effective - IT staffing, and learn from the mistakes others have made.
Business owners know how important it is to portray a consistent and professional image. Part of that image includes your email signature. Email signatures are a great opportunity to brand every message you send when communicating with clients, prospects, and vendors. A cohesive email signature leaves an impression and helps develop brand recognition and trust in the long run.
Video conferencing and virtual collaboration are a major part of the business world today. Many companies are asking some (if not all) of their employees to work from home, causing the demand for teleconferencing to skyrocket. With so many video conferencing tools to choose from -- how do you know which one is right for your business? In this article, we'll compare the three most popular business video conferencing platforms (Zoom, Teams, and GoToMeeting) in four key areas -- functionality, integration, cost, and security. This will help give you a clear picture of which video conferencing option is best for your specific needs.
Whether we like it or not, the business world has changed because of COVID-19. Even as the virus begins to fade in certain regions of the globe, its effects remain. What will the long-term impacts of our "new normal" in the workplace be? None of us know for sure, but we’re seeing a few trends with staying power.
The COVID-19 pandemic has impacted all parts of the business world. From social distancing to a fully remote workforce, companies are continuing to adapt to the "new normal," with varying degrees of success. One of those adaptations has been the use of video conferencing technology for virtual meetings.
Now that you're working from home, there are a few security best practices to follow to help make sure you and your company are protected from cyber security threats. For example, have you thought about the security of your home network with all of your "things" connected to it? Don't forget that working securely has as much to do with your actions as it does with your IT environment, so don't let your new work location let down your guard.
You’re gearing up to pick the best outsourced IT company for your business, excited about the potential benefits! But you aren’t 100% sure how to pick the best managed IT services provider. Or maybe you’ve narrowed it down, but now you’re stuck in a dead tie. Accent Computer Solutions, Inc. has been helping companies develop their best IT strategy for over 30 years. A topic that frequently comes up is, “How can I compare IT support companies? What criteria should I evaluate?” Since we talk about it often, we’ve compiled a list to help narrow down your search for the right IT support!
Microsoft research shows that 90% of all compromised passwords come from a data breach. You read that right - 90%! Criminals use tools that can guess thousands of passwords a minute. Their goal is to wreak havoc on your network and steal your trade secrets. But, not all these criminals are hacking masterminds. These attacks can also be a result of a coworker or family member snooping around.
I got a call from a client recently asking, “Why are emails from my customers getting caught in my spam filter instead of sent to my inbox?” Fair question. The emails he was referencing were from a customer that he communicates with all the time. And to make matters worse, he didn’t even know the emails had been sent until a customer called to ask why he hadn’t been responding. He was understandably frustrated.