<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=573132769549581&amp;ev=PageView&amp;noscript=1">

The ACCENT Learning Hub

The IT Support Learning Hub

The most educational business technology blog for Southern California executives, featuring insider tips, articles, and videos on how to get the best IT results.

Blog Feature

The IT Help Desk

How Small Businesses Can Protect Against the Growing Ransomware Threats

By: Ryan Ziska
May 30th, 2018

    Since 2009, there has been a significant rise in ransomware attacks, and it shows no signs of slowing down. BUT WHY?!?!? To put it simply: because it works. Ransomware is a form of malware designed to take over your computer, files, folders, and networks. And according to Norton Antivirus, it isn’t always just one cybercriminal -- it could be cyber-gangs working together to make money off unsuspecting users. It’s time for all companies, especially small businesses, to be on high alert and have the proper protection against ransomware.

Read More

Share

Blog Feature

Tightening IT Security | The IT Help Desk

3 Most Popular Ways Hackers Scam Small Businesses

By: Ryan Ziska
May 2nd, 2018

    In March 2018, Microsoft released their bi-annual Security Intelligence Report. Microsoft scanned 400 billion email messages, 18 billion web pages, and 1.2 billion devices for threats. But what does that mean for small business? What are the hackers' methods? How can you protect your company?

Read More

Share

Learn how to develop an IT strategy book chapter

Do IT Right: It's Not About The Computers

Optimize your business's IT function, understand proper - and cost effective - IT staffing, and learn from the mistakes others have made.

Blog Feature

Tech Tips | The IT Help Desk

5 Password Policy Guidelines for Small to Mid-Size Businesses

By: Ryan Ziska
March 2nd, 2018

    Microsoft research shows that 90% of all compromised passwords come from a data breach. You read that right - 90%! Criminals use tools that can guess thousands of passwords a minute. Their goal is to wreak havoc on your network and steal your trade secrets. But, not all these criminals are hacking masterminds. These attacks can also be a result of a coworker or family member snooping around.

Read More

Share