<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=573132769549581&amp;ev=PageView&amp;noscript=1">

The ACCENT Learning Hub

The IT Support Learning Hub

The most educational business technology blog for Southern California executives, featuring insider tips, articles, and videos on how to get the best IT results.

Blog Feature

IT Support FAQs | Tech Tips | Tightening IT Security

Video Tip: 3 Tips To Secure Your Mobile Devices

By: Courtney Casey
October 4th, 2018

Want to make sure your smartphones, tablets, and other mobile devices are as secure as possible? Check out this 90-second video tip from Chris, one of Accent’s vCIOs, with 3 tips to secure your mobile devices.

Read More

Share

Blog Feature

Tech Alert | Tightening IT Security | The Cloud

Tech Alert: Is the Cloud More Secure Than the Server in My Office?

By: Accent Computer Solutions
October 3rd, 2018

The best, and arguably the worst, thing about the rapid growth of technology is options. Long gone are the days where chocolate or vanilla were your only choices. In a post-Ben & Jerry’s world of Truffle Kerfuffle and Chubby Hubby, how are you supposed to know what to pick? And maybe the million-plus specialty ice cream flavors out there isn't exactly the same. But it’s easy to feel as overwhelmed by specialty ice cream as when you’re evaluating your server options.

Read More

Share

Learn how to develop an IT strategy book chapter

Do IT Right: It's Not About The Computers

Optimize your business's IT function, understand proper - and cost effective - IT staffing, and learn from the mistakes others have made.

Blog Feature

Tightening IT Security

Compliance Isn't Enough for Healthcare Organizations

By: Accent Computer Solutions
September 25th, 2018

Imagine that you get an invoice from a hospital for $125,000. No doubt you’ll experience sticker shock at the high cost of medical care. But wait a minute. This hospital is in a city that you have never visited, and it’s for a surgery that you never had. How did this happen? You’ve just become another victim of medical fraud. You can now expect to spend a few hundred hours of your life and thousands of dollars of your own money to clean up the mess that a cyber criminal made by stealing and using your medical records.

Read More

Share

Blog Feature

Tightening IT Security | Executive Insights

5 Ways Executives Stumble Over Cyber Security

By: Accent Computer Solutions
September 17th, 2018

In a recent blog article, Marty Kaufman recounts the story of meeting with a business owner who was panicked and in crisis mode because of a cyber attack. If we could backtrack to the days, weeks and months before the attack, we would probably find that the business owner did not pay much attention to cyber security at all because he didn’t think that a data breach could happen to him. Well, it could, and it did. We can’t go back in time and undo all the damage that has been done by this cyber attack, but we can help other executives avoid stumbling over some common misconceptions that unknowingly increase cyber risk.

Read More

Share

Blog Feature

Tightening IT Security

Cyber Security in Your Business Strategy is Like a Fitness Plan

By: Accent Computer Solutions
September 11th, 2018

When cyber security is part of your business strategy, it acts like a fitness plan. You’ll never know what illnesses or injuries you avoided by being on the plan, but you notice that your ability to maneuver is much better than your peers. Still, it’s often difficult for executives to contemplate the ROI of cyber security. Maybe that’s because you can’t directly measure the output from the input. You can, however, when you make it a habit to consider security alongside your business goals.

Read More

Share

Blog Feature

Tightening IT Security

5 Questions to Ask Yourself if You Don’t Think Cyber Security is an Executive Problem

By: Accent Computer Solutions
September 5th, 2018

It might be time to drop the word “cyber” when talking about cyber security because managing cyber risk is really about managing business risk. IT certainly plays an important role in how information technology systems and stored data are protected, but executives need to understand that there is more at risk than they realize. For example, executives sometimes make decisions in the name of productivity or cost savings that compromise security. Perhaps these decisions would be made differently if the executives realized what a risky situation their actions created and they asked themselves these five questions.

Read More

Share

Blog Feature

Executive Insights | Tightening IT Security

Cyber Risk is Business Risk

By: Marty Kaufman
August 30th, 2018

Just recently, I learned about a local business that experienced a cyber attack. All of the employees were sent home to work from their personal computers because the owner was afraid that using their business systems would make matters worse. This business owner called and asked me to come over to talk with him about the situation. As I sat in his conference room and discussed what was going on, he was actually being attacked while I was there! Bank accounts and financial information were being compromised real time.

Read More

Share

Blog Feature

Tightening IT Security

Email Safety Best Practices: How to Stay Safe From Email Scams

By: Jessica Duncan
June 26th, 2018

    We all know that email scams are going around like crazy these days. Our goal is to keep you and your company safe. There are a few simple techniques that will help with our security efforts. In this article, we’ll cover: Creating a Secure Password How to Recognize and Avoid Phishing Scams And Steps to Prevent Fraudulent Payments So, let's dive in.

Read More

Share

Blog Feature

Executive Insights | Tightening IT Security

IT Security and GDPR: What to Do Next

By: Marty Kaufman
May 31st, 2018

This month has been a security and compliance whirlwind! The European Union’s General Data Protection Regulation (GDPR) went into effect on May 25, 2018. I’m sure you’ve received a LOT of emails from companies notifying you that they’ve updated their privacy policies. This is just one step companies are taking to become GDPR compliant. We’ve been getting a lot of questions about GDPR and compliance, so here’s a brief overview about what’s going on, and what you may need to do.

Read More

Share

Blog Feature

Tech Girl | Tightening IT Security

Your IT Support Provider's Role in Regulatory Compliance

By: Courtney Casey
May 29th, 2018

With the recent enforcement of the European Union’s General Data Protection Regulation (GDPR) on May 25, 2018, there’s been a lot of talk regarding regulatory compliance; specifically, who is responsible for what.

Read More

Share