<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=573132769549581&amp;ev=PageView&amp;noscript=1">

The ACCENT Learning Hub

The IT Support Learning Hub

The most educational business technology blog for Southern California executives, featuring insider tips, articles, and videos on how to get the best IT results.

Blog Feature

Tightening IT Security

Email Safety Best Practices: How to Stay Safe From Email Scams

By: Jessica Duncan
June 26th, 2018

    We all know that email scams are going around like crazy these days. Our goal is to keep you and your company safe. There are a few simple techniques that will help with our security efforts. In this article, we’ll cover: Creating a Secure Password How to Recognize and Avoid Phishing Scams And Steps to Prevent Fraudulent Payments So, let's dive in.

Read More

Share

Blog Feature

Executive Insights | Tightening IT Security

IT Security and GDPR: What to Do Next

By: Marty Kaufman
May 31st, 2018

This month has been a security and compliance whirlwind! The European Union’s General Data Protection Regulation (GDPR) went into effect on May 25, 2018. I’m sure you’ve received a LOT of emails from companies notifying you that they’ve updated their privacy policies. This is just one step companies are taking to become GDPR compliant. We’ve been getting a lot of questions about GDPR and compliance, so here’s a brief overview about what’s going on, and what you may need to do.

Read More

Share

Learn how to develop an IT strategy book chapter

Do IT Right: It's Not About The Computers

Optimize your business's IT function, understand proper - and cost effective - IT staffing, and learn from the mistakes others have made.

Blog Feature

Tightening IT Security | Tech Girl

Your IT Support Provider's Role in Regulatory Compliance

By: Courtney Casey
May 29th, 2018

With the recent enforcement of the European Union’s General Data Protection Regulation (GDPR) on May 25, 2018, there’s been a lot of talk regarding regulatory compliance; specifically, who is responsible for what.

Read More

Share

Blog Feature

Tightening IT Security | The IT Help Desk

3 Most Popular Ways Hackers Scam Small Businesses

By: Ryan Ziska
May 2nd, 2018

    In March 2018, Microsoft released their bi-annual Security Intelligence Report. Microsoft scanned 400 billion email messages, 18 billion web pages, and 1.2 billion devices for threats. But what does that mean for small business? What are the hackers' methods? How can you protect your company?

Read More

Share

Blog Feature

Tightening IT Security | Tech Girl

Top 6 Cyber Security Basics for Small Businesses

By: Courtney Casey
April 27th, 2018

    Most small business executives agree that cyber security threats are real. From malware to phishing scams, many have gone through the pain of losing data, money, productivity, or all of the above. If you haven’t suffered a loss yet, you should count yourself among the lucky. You know that your company data should be secured as much as possible, but cyber security is an expansive topic with many areas to cover, so where do you start?

Read More

Share

Blog Feature

Strategic Technology Planning | Tightening IT Security

Cybersecurity & Risk Management Techniques for Small Business Managers

By: Peter O'Campo
March 7th, 2018

  Cybersecurity is much more than an IT problem these days - it's become a general business problem. Before we dive in, let's remember that cybersecurity is not just a topic for large corporations. It affects EVERYONE, especially those in the small to mid-size business (SMB) market. The revelation of the Meltdown and Spectre vulnerabilities reminds us that cybersecurity affects everybody, individuals and businesses alike. Statistics are pointing towards hackers focusing a lot of energy on SMBs this year. Why, you ask? Good question.

Read More

Share

Blog Feature

Tightening IT Security

What We Know Now About Meltdown & Spectre

By: Courtney Casey
January 5th, 2018

If you’ve been following the news, you may have heard about two new security threats, called Meltdown and Spectre. Your technology security is critical to us and we’ve been monitoring the situation closely since the news broke on Wednesday, January 3rd. Details are still unfolding, so we’ll keep you posted. Here’s what we know now.

Read More

Share

Blog Feature

Tightening IT Security | Tech Alert

Tech Alert: Giving Network Access to a Vendor and How to Handle It

By: Accent Computer Solutions
August 7th, 2017

The Internet has changed how we do business. Now if only I had $1 for every time I heard that, the Internet would’ve also changed my tax bracket. In all sincerity, IT departments have the challenge of keeping your network safe. With the growing number of cyber threats and the amount of data companies are storing today, IT is in a real pickle. Security is of the utmost importance, so it’s scary when a vendor asks for access to your network.

Read More

Share

Blog Feature

Tightening IT Security | Ask An IT Guy

Ask an IT Guy: Is Guest WiFi Safe for Your Network?

By: Accent Computer Solutions
July 12th, 2017

Coffee has been bested by WiFi – the world officially runs on wireless internet access. I don’t say this lightly, but the other day I noticed that a gas station offered free guest WiFi. And at that moment, I realized mobility is key to making your customers happy. I’m willing to bet that you’d have to think hard about the last time you went somewhere that DIDN’T offer public WiFi.

Read More

Share

Blog Feature

The Cloud | Tightening IT Security | Tech Alert

Tech Alert: Is the Cloud More Secure Than the Server in My Office?

By: Accent Computer Solutions
July 10th, 2017

The best, and arguably the worst, thing about the rapid growth of technology is options. Long gone are the days where chocolate or vanilla were your only choices. In a post-Ben & Jerry’s world of Truffle Kerfuffle and Chubby Hubby, how are you supposed to know what to pick? And maybe the million-plus specialty ice cream flavors out there isn't exactly the same. But it’s easy to feel as overwhelmed by specialty ice cream as when you’re evaluating your server options.

Read More

Share