Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Bias Can Impact Your Business from Within

Bias Can Impact Your Business from Within

Despite what you may have heard, a bias is not an inherently bad thing. However, if not considered rationally, a bias can easily lead you to make a business decision that does more harm than good. Researchers have uncovered why we hold the biases we do, and how we might work to overcome them.

Continue reading
0 Comments

How to Keep Your Mobile Data Safe

How to Keep Your Mobile Data Safe

Oh no. You slap your pockets in a sudden panic, but you only confirm what you suddenly feared: you’ve lost your mobile device, the one with all of your business data on it. You haven’t an idea where you might have left it - all you know is that it’s just... gone.

Continue reading
0 Comments

Tech Term: Router

Tech Term: Router

The more that people depend on mobile devices and portable computers to get work done, the more businesses have to consider how to manage their organization’s wireless network. The router is the piece of hardware that makes the wireless network possible. Today, we will talk a little bit about the router and how its configuration can dictate the strength, reliability, and security of your business’ wireless network.

Continue reading
0 Comments

How the CLOUD Act Will Affect Your Security

How the CLOUD Act Will Affect Your Security

On March 23rd, 2018, the United States Congress passed another spending bill that could potentially limit individual privacy protection all over the world. This bill included a provision called the Clarifying Lawful Overseas Use of Data (or CLOUD) Act, which makes changes to the Stored Communications Act of 1986 and provides unelected American officials a considerable amount of power over digital privacy rights.

Continue reading
0 Comments

What’s the Best Form of Authentication on Your Mobile Device?

What’s the Best Form of Authentication on Your Mobile Device?

As smartphones have become smarter, they have become filled with more and more data that needs to be kept private for the owner’s safety and security. This is why it is fortunate that there are also more ways to secure a smartphone against unauthorized use. We’ll examine the many options to devise which is the most secure.

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Cloud Internet Microsoft Software Business Computing Business Management Hackers Productivity Google Efficiency Hosted Solutions Backup Managed Service Provider Business Innovation windows Malware Workplace Tips User Tips IT Support Mobile Devices IT Services Computer Hardware Upgrade Miscellaneous Saving Money Windows 10 Email Virtualization Gadgets Apps Network Security Communication Server Disaster Recovery Business Continuity Data Mobile Computing Smartphones Mobile Device Management Microsoft Office Information Technology Small Business Network Quick Tips VoIP Smartphone Social Media Productivity Health Mobile Office Going Green Android Operating System Browser Chrome Passwords Holiday App Alert Best Practice Cybercrime Save Money Office spam Collaboration BYOD Marketing Application Ransomware Cybersecurity The Internet of Things Law Enforcement Apple WiFi Remote Computing Tablet Employer-Employee Relationship Search Wearable Technology Facebook User Error History Vendor Management Managed IT Services Antivirus Unified Threat Management Hacking Avoiding Downtime Phishing iPhone communications Risk Management Data Security Maintenance Wireless Technology Government Customer Relationship Management Office Tips Remote Monitoring Password Money Computers Data Management Social Data Backup Telephone Systems Hard Drives Internet of Things IT Solutions Office 365 Big Data Mobility Saving Time BDR Analytics OneNote Two-factor Authentication Proactive IT Firewall Wireless Update Tech Term Users Bandwidth Lithium-ion battery Unsupported Software Current Events Shortcut Bring Your Own Device Wi-Fi VPN Humor Vulnerability Website Data Recovery Net Neutrality Outsourced IT Printer Google Drive Cost Management Tech Support Outlook Social Networking Router Phone System USB Encryption Automation Virus administration Streaming Media Identity Theft Trending Audit Excel Disaster Intranet Laptop Work/Life Balance IT Support Content Filtering Cloud Computing Windows 10 Politics Social Engineering Education Television Retail IT COnsultant Computer Repair Budget Gmail Recovery Managed IT PowerPoint Personal Information Uninterrupted Power Supply Sales HaaS Data Protection Automobile Cleaning Managing Stress Storage Managed IT Services Online Currency Save Time Computer Care Hosted Solution Windows 8 Patch Management Business Intelligence Augmented Reality Meetings Point of Sale Customer Service Legal Travel Telephony Fraud Printer Server Biometrics Transportation End of Support Google Docs Commerce Private Cloud Virtual Reality Flexibility Programming Networking Twitter HIPAA Internet Exlporer Mobile Security Data Storage DDoS Instant Messaging Paperless Office Emails Cortana Sports Fax Server Entertainment WannaCry Benefits Computer Accessories Artificial Intelligence eWaste Computing Blockchain Samsung Battery Identities NFL Nanotechnology Safety WIndows 7 Operating Sysytem Hard Drive Network Congestion Specifications 3D Printing Training IT solutions Regulations Surge Protector Microsoft Word Language Word Root Cause Analysis Bluetooth Company Culture Images junk Conferencing Webinar Device Security IT Management Windows 10s Cameras Reputation Windows Ink SharePoint User filter Gifts Devices WIndows Server 2008 Solid State Drive Virtual Desktop Worker Commute Presentation Administrator hacker Proactive Google Maps Settings Teamwork Keyboard Best Available Help Desk Science Community Video Games Credit Cards Debate Spyware ISP Hard Disk Drive Access Websites Intrantet Data Loss Hiring/Firing FAQ Sync Buisness Blogging Tutorial Data Theft Running Cable Smart Technology Mobile Device Charger Edge Near Field Communication Robot Advertising App store Lifestyle Microsoft Excel Co-managed IT Scalability Wireless Charging Ciminal Adobe iOS Human Resources Display Experience IT consulting Data storage PDF File Sharing Amazon Scam Upgrades How To Data Breach Project Management OneDrive Applications Computer Fan Music Reliable Computing Print Server Text Messaging Compliance Identity Screen Mirroring Distributed Denial of Service Employer Employee Relationship Consultant Bloatware Evernote IT budget Nokia Licensing Ebay Books Touchpad Inbound Marketing Data Privacy Gift Giving Legislation Cast Youtube Files Touchscreen Black Market Workers Tablets Monitors Branding Electronic Medical Records Mouse Value Comparison Microblogging SaaS Chromecast HBO Webinar Updates