<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=573132769549581&amp;ev=PageView&amp;noscript=1">

The ACCENT Learning Hub

The ACCENT Learning Hub

The most educational business technology blog for Southern California executives, featuring insider tips, articles, and videos on how to get the best IT results.

Blog Feature

Strategic Technology Planning | Tightening IT Security

Cybersecurity & Risk Management Techniques for Small Business Managers

By: Peter O'Campo
March 7th, 2018

  Cybersecurity is much more than an IT problem these days - it's become a general business problem. Before we dive in, let's remember that cybersecurity is not just a topic for large corporations. It affects EVERYONE, especially those in the small to mid-size business (SMB) market. The revelation of the Meltdown and Spectre vulnerabilities reminds us that cybersecurity affects everybody, individuals and businesses alike. Statistics are pointing towards hackers focusing a lot of energy on SMBs this year. Why, you ask? Good question.

Read More

Share

Blog Feature

Tightening IT Security

What We Know Now About Meltdown & Spectre

By: Courtney Casey
January 5th, 2018

If you’ve been following the news, you may have heard about two new security threats, called Meltdown and Spectre. Your technology security is critical to us and we’ve been monitoring the situation closely since the news broke on Wednesday, January 3rd. Details are still unfolding, so we’ll keep you posted. Here’s what we know now.

Read More

Share

Learn how to develop an IT strategy book chapter

Do IT Right: It's Not About The Computers

Optimize your business's IT function, understand proper - and cost effective - IT staffing, and learn from the mistakes others have made.

Blog Feature

Tightening IT Security | Tech Alert

Tech Alert: Giving Network Access to a Vendor and How to Handle It

By: Mireya Fernandez
August 7th, 2017

The Internet has changed how we do business. Now if only I had $1 for every time I heard that, the Internet would’ve also changed my tax bracket. In all sincerity, IT departments have the challenge of keeping your network safe. With the growing number of cyber threats and the amount of data companies are storing today, IT is in a real pickle. Security is of the utmost importance, so it’s scary when a vendor asks for access to your network.

Read More

Share

Blog Feature

Tightening IT Security | Ask An IT Guy

Ask an IT Guy: Is Guest WiFi Safe for Your Network?

By: Mireya Fernandez
July 12th, 2017

Coffee has been bested by WiFi – the world officially runs on wireless internet access. I don’t say this lightly, but the other day I noticed that a gas station offered free guest WiFi. And at that moment, I realized mobility is key to making your customers happy. I’m willing to bet that you’d have to think hard about the last time you went somewhere that DIDN’T offer public WiFi.

Read More

Share

Blog Feature

The Cloud | Tightening IT Security | Tech Alert

Tech Alert: Is the Cloud More Secure Than the Server in My Office?

By: Mireya Fernandez
July 10th, 2017

The best, and arguably the worst, thing about the rapid growth of technology is options. Long gone are the days where chocolate or vanilla were your only choices. In a post-Ben & Jerry’s world of Truffle Kerfuffle and Chubby Hubby, how are you supposed to know what to pick? And maybe the million-plus specialty ice cream flavors out there isn't exactly the same. But it’s easy to feel as overwhelmed by specialty ice cream as when you’re evaluating your server options.

Read More

Share

Blog Feature

Tightening IT Security | Tech Girl

Should Business Owners Phish Their Employees?

By: Courtney Casey
July 6th, 2017

We’re living in a time where cybercrime and ransomware attacks are announced like the next big box office hit. They’re making an impact worldwide, and it’s causing many businesses to suffer downtime, loss of business, and increased costs to recover from attacks. One of the most common types of scams affecting businesses is referred to as phishing. Phishing attacks are generally emails that entice users to perform an action, like clicking a link to an infected webpage, opening a malicious attachment, or even wiring money.

Read More

Share

Blog Feature

Tightening IT Security | Ask An IT Guy

Ask an IT Guy: Do Small Businesses Need a Firewall?

By: Mireya Fernandez
June 26th, 2017

Your first line of defense should always be the strongest. In a world where cybercrime has a “break in where you can” mentality, layered security is the only way to keep you safe. The Great Wall of China's purpose was to defend against invaders. Your firewall protects you from the attacks of hackers. Think of it as your personal Great Wall.

Read More

Share

Blog Feature

Improving Productivity | Tightening IT Security | Tech Minute

Tech Minute: The Best Way to Stop Employees from Clicking on Phishing Scams [Case Study]

By: Mireya Fernandez
June 21st, 2017

In a world where cybercrime is a daily threat, but concerns for it are often set aside for things like convenience or cost – how do you stay safe? Luckily your IT professional has established security features like firewalls, antivirus, and other protections that keep you safe. However, a simple click can unravel that safety in a split-second. Scams also known as “phishing,” ask for permission to run on your computer and if that permission is granted no amount of firewalls or antivirus can save you. As cybercrime ups the ante, what is your game plan?

Read More

Share

Blog Feature

The Cloud | Tightening IT Security | Ask An IT Guy

Ask an IT Guy: I Have the Best Business Antivirus – I’m Secure, Right?

By: Mireya Fernandez
June 16th, 2017

With the number of security threats going around today, business executives have security on their minds. While most don’t argue about the need for antivirus, (yes, I’m looking at you Mac users), does having the best business antivirus solution mean you’re protected from all IT security threats?

Read More

Share

Blog Feature

Tightening IT Security | Tech Alert

Tech Alert: Top 5 Types of Email Scams Employees Keep Falling For

By: Mireya Fernandez
June 12th, 2017

How many different kinds of shoes do you own? Think about it. Dress shoes, sneakers, boots, flip-flops, etc., there are so many types of shoes for different occasions. Similarly, there are many types of email scams that hackers run to steal your information. And while a scam is a scam, much like a shoe is a shoe, the difference is in the approach. We have reached a critical point in scamming where the wheel is turning at a much faster and more focused rate. Educating your employees on the kinds of scams and their purpose(s) can go a long way in a strong united defense for your company. Considering the fact that companies can be down for hours or sometimes DAYS following one wrong click, the stakes are much too high to ignore scamming styles any longer. 

Read More

Share