Category: Blog

What is Two-Factor and Multi-Factor Authentication and Why Do I Need It?

Security is a primary concern of businesses, consumers and enterprises throughout the world. With news reports of hacks, data breaches and stolen identities, trust is at an all-time low.  And that’s a good thing, especially when it comes to cyber-security. Today’s cyber-security-sensitive companies are actively introducing new security layers to their users’ workflows to thwart… [Read More]

Exciting News!

Exciting news! ACCi’s very own, Joel Sargent will be performing a new role as vCIO/Chief Security Consultant. Joel will be responsible for providing vCIO consulting services to our clients and for designing our advanced Managed Security Practice offering and delivering those services as well. The vCIO collaborates with and advises clients’ IT departments and performs… [Read More]

What will downtime cost your business?

  Do you ever stop to think of how much your business depends on computers? How about the costs that you would incur if your business computer network failed? Many businesses do not fully understand how dependent they are on their computer network, until they experience some type of network downtime. Depending on the type… [Read More]

ACCi Team Outing!

TopGolf Team outing! We enjoyed lunch and a few laughs with our team before the holidays! Wishing you all a Merry Christmas and a safe and Prosperous New Year! Click the link for a quick glance of the beautiful day! Topgolf  

Learn to spot any scams or spam

Some phishing scams are easily identifiable. Some other phishing attempts through email, social networking, IM, etc. look legitimate. The only way of ensuring you never fall for these scams is by not clicking on links that are sent to you. If you get an email from your bank, don’t just assume it’s actually from your… [Read More]

How to Protect your Online Identity Effectively

Identity theft is a kind of scam, deception, or crime which results in the loss of passwords, usernames, banking information, social security numbers, credit card numbers, health ID’s, etc. which are then used to commit crimes like fraud. Identity theft online occurs when users fall for confidence or phishing scams, download malicious software, use insecure… [Read More]

Insider Threat

A malicious employee is more dangerous to your sensitive data than external threats or technical vulnerabilities. The losses from the crime conducted by insiders are significant as these people are familiar with the company’s data system and have access to the sensitive accounts. According to a new study from Intel Security, insider threats are responsible… [Read More]

Open Wi-Fi Open Wi-Fi

Open Wi-Fi networks involve unencrypted connections, compromised machines or even the hotspot itself can be malicious—leaving user’s data at a great risk. It is reported that there are 100,000 unsecured public Wi-Fi across the world, meaning that one in four is not secure. What to Do? Avoid using public Wi-Fi networks for the processing of… [Read More]