<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=573132769549581&amp;ev=PageView&amp;noscript=1">

The ACCENT Learning Hub

The IT Support Learning Hub

The most educational business technology blog for Southern California executives, featuring insider tips, articles, and videos on how to get the best IT results.

Blog Feature

Executive Insights | Tightening IT Security

IT Security and GDPR: What to Do Next

By: Marty Kaufman
May 31st, 2018

This month has been a security and compliance whirlwind! The European Union’s General Data Protection Regulation (GDPR) went into effect on May 25, 2018. I’m sure you’ve received a LOT of emails from companies notifying you that they’ve updated their privacy policies. This is just one step companies are taking to become GDPR compliant. We’ve been getting a lot of questions about GDPR and compliance, so here’s a brief overview about what’s going on, and what you may need to do.

Read More

Share

Blog Feature

Tightening IT Security | Tech Girl

Your IT Support Provider's Role in Regulatory Compliance

By: Courtney Casey
May 29th, 2018

With the recent enforcement of the European Union’s General Data Protection Regulation (GDPR) on May 25, 2018, there’s been a lot of talk regarding regulatory compliance; specifically, who is responsible for what.

Read More

Share

Learn how to develop an IT strategy book chapter

Do IT Right: It's Not About The Computers

Optimize your business's IT function, understand proper - and cost effective - IT staffing, and learn from the mistakes others have made.

Blog Feature

Tightening IT Security | The IT Help Desk

3 Most Popular Ways Hackers Scam Small Businesses

By: Ryan Ziska
May 2nd, 2018

    In March 2018, Microsoft released their bi-annual Security Intelligence Report. Microsoft scanned 400 billion email messages, 18 billion web pages, and 1.2 billion devices for threats. But what does that mean for small business? What are the hackers' methods? How can you protect your company?

Read More

Share

Blog Feature

Tightening IT Security | Tech Girl

Top 6 Cyber Security Basics for Small Businesses

By: Courtney Casey
April 27th, 2018

    Most small business executives agree that cyber security threats are real. From malware to phishing scams, many have gone through the pain of losing data, money, productivity, or all of the above. If you haven’t suffered a loss yet, you should count yourself among the lucky. You know that your company data should be secured as much as possible, but cyber security is an expansive topic with many areas to cover, so where do you start?

Read More

Share

Blog Feature

Strategic Technology Planning | Tightening IT Security

Cybersecurity & Risk Management Techniques for Small Business Managers

By: Peter O'Campo
March 7th, 2018

  Cybersecurity is much more than an IT problem these days - it's become a general business problem. Before we dive in, let's remember that cybersecurity is not just a topic for large corporations. It affects EVERYONE, especially those in the small to mid-size business (SMB) market. The revelation of the Meltdown and Spectre vulnerabilities reminds us that cybersecurity affects everybody, individuals and businesses alike. Statistics are pointing towards hackers focusing a lot of energy on SMBs this year. Why, you ask? Good question.

Read More

Share

Blog Feature

Tightening IT Security

What We Know Now About Meltdown & Spectre

By: Courtney Casey
January 5th, 2018

If you’ve been following the news, you may have heard about two new security threats, called Meltdown and Spectre. Your technology security is critical to us and we’ve been monitoring the situation closely since the news broke on Wednesday, January 3rd. Details are still unfolding, so we’ll keep you posted. Here’s what we know now.

Read More

Share

Blog Feature

Tightening IT Security | Tech Alert

Tech Alert: Giving Network Access to a Vendor and How to Handle It

By: Mireya Fernandez
August 7th, 2017

The Internet has changed how we do business. Now if only I had $1 for every time I heard that, the Internet would’ve also changed my tax bracket. In all sincerity, IT departments have the challenge of keeping your network safe. With the growing number of cyber threats and the amount of data companies are storing today, IT is in a real pickle. Security is of the utmost importance, so it’s scary when a vendor asks for access to your network.

Read More

Share

Blog Feature

Tightening IT Security | Ask An IT Guy

Ask an IT Guy: Is Guest WiFi Safe for Your Network?

By: Mireya Fernandez
July 12th, 2017

Coffee has been bested by WiFi – the world officially runs on wireless internet access. I don’t say this lightly, but the other day I noticed that a gas station offered free guest WiFi. And at that moment, I realized mobility is key to making your customers happy. I’m willing to bet that you’d have to think hard about the last time you went somewhere that DIDN’T offer public WiFi.

Read More

Share

Blog Feature

The Cloud | Tightening IT Security | Tech Alert

Tech Alert: Is the Cloud More Secure Than the Server in My Office?

By: Mireya Fernandez
July 10th, 2017

The best, and arguably the worst, thing about the rapid growth of technology is options. Long gone are the days where chocolate or vanilla were your only choices. In a post-Ben & Jerry’s world of Truffle Kerfuffle and Chubby Hubby, how are you supposed to know what to pick? And maybe the million-plus specialty ice cream flavors out there isn't exactly the same. But it’s easy to feel as overwhelmed by specialty ice cream as when you’re evaluating your server options.

Read More

Share

Blog Feature

Tightening IT Security | Tech Girl

Should Business Owners Phish Their Employees?

By: Courtney Casey
July 6th, 2017

We’re living in a time where cybercrime and ransomware attacks are announced like the next big box office hit. They’re making an impact worldwide, and it’s causing many businesses to suffer downtime, loss of business, and increased costs to recover from attacks. One of the most common types of scams affecting businesses is referred to as phishing. Phishing attacks are generally emails that entice users to perform an action, like clicking a link to an infected webpage, opening a malicious attachment, or even wiring money.

Read More

Share