Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Can You Trust Your Mobile Apps?

Can You Trust Your Mobile Apps?

You can never know whether or not that app you just downloaded to your smartphone can expose your data or identity to risk. While Google Play and the iTunes store certainly put efforts into ensuring that users can safely browse their app stores, it’s unlikely that they can find every single malicious app out there before it infects someone’s device. Therefore, you need to consider the following measures to ensure that you don’t put your business at risk by downloading unsecure apps.

Continue reading
0 Comments

Could You Spot a Social Engineering Attack?

Could You Spot a Social Engineering Attack?

As invaluable as the security solutions that protect a network are, they can be effectively rendered useless if a cybercriminal is skilled in social engineering. Social engineering is the practice of using manipulation to access protected resources, as we will review later. If your business and its team are vulnerable to a social engineering attempt, you are missing a critical piece of your data security strategy.

Continue reading
0 Comments

Tip of the Week: Awareness is Key to Mobile Device Security

Tip of the Week: Awareness is Key to Mobile Device Security

With more and more businesses relying on mobile devices for their business they have to be sure that the use of these devices doesn’t present security issues for the company. With all that is happening in business computing today, finding out how you can protect yourself in lieu of the prevalence smartphones play in the business world is important. Here are a few tips on how to lock it up or lose it, altogether.

Continue reading
0 Comments

IoT Security is a Key Business Concern

IoT Security is a Key Business Concern

The Internet of Things is everywhere, which means that potential security risks are also everywhere. Your business needs to take the risks presented by the IoT into account and prepare accordingly.

Continue reading
0 Comments

Tip of the Week: Prime Your Business for a Successful 2018

Tip of the Week: Prime Your Business for a Successful 2018

As 2018 progresses, certain technologies and implementations are becoming more prominently used by businesses. These trends are anticipated to continue, so it only makes sense to embrace these technologies sooner rather than later. Today, we’ll review some of these technologies, why they are expected to grow, and how you can use them to benefit your business operations.

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Privacy Best Practices Cloud Internet Microsoft Software Business Management Productivity Business Computing Hackers Google Efficiency Backup Hosted Solutions Managed Service Provider Innovation Business windows Workplace Tips User Tips Malware IT Support Hardware IT Services Computer Miscellaneous Mobile Devices Upgrade Saving Money Windows 10 Email Virtualization Gadgets Disaster Recovery Business Continuity Apps Communication Server Mobile Computing Mobile Device Management Microsoft Office Information Technology Smartphone Data Small Business Smartphones Quick Tips VoIP Health Productivity Network Social Media Network Security Mobile Office Going Green Browser Chrome Holiday Android Office Operating System App Alert Best Practice Save Money Cybercrime Passwords Marketing Application Collaboration BYOD Ransomware Tablet Search The Internet of Things Wearable Technology spam Cybersecurity Apple WiFi Remote Computing iPhone Managed IT Services Employer-Employee Relationship Risk Management Wireless Technology Maintenance Facebook User Error Unified Threat Management History Vendor Management Hacking Avoiding Downtime Law Enforcement communications IT Solutions Internet of Things Hard Drives Big Data Money BDR Saving Time Government Office Tips Remote Monitoring Antivirus Office 365 Customer Relationship Management Password Data Security Mobility Data Management Computers Data Backup Social Telephone Systems Printer Unsupported Software Tech Support Outlook Router Cost Management USB Encryption Phone System Social Networking Data Recovery Outsourced IT Analytics Automation OneNote Proactive IT Firewall Google Drive Lithium-ion battery Bandwidth Users Current Events Shortcut VPN Bring Your Own Device Humor Website Phishing Net Neutrality Wireless IT Support IT COnsultant Cloud Computing Windows 10 Work/Life Balance Budget Gmail Computer Repair Recovery Vulnerability Wi-Fi PowerPoint Politics Streaming Media Two-factor Authentication Trending Audit administration Intranet Excel Laptop Content Filtering Disaster Managed IT Television Social Engineering Education Retail Identity Theft Paperless Office DDoS Instant Messaging Emails Fax Server Entertainment Sports Benefits Commerce Legal eWaste Computer Accessories Transportation End of Support Flexibility Data Storage HaaS Virus Uninterrupted Power Supply Sales Managing Stress Online Currency Update Storage WannaCry Artificial Intelligence Augmented Reality Samsung Google Docs Hosted Solution Business Intelligence Point of Sale Meetings Printer Server Travel Battery Windows 8 Telephony Customer Service Biometrics Cleaning Personal Information Twitter Programming Automobile Private Cloud Virtual Reality Networking Managed IT Services Save Time Computer Care HIPAA Cortana Internet Exlporer Human Resources Settings IT consulting Evernote Keyboard Reputation Lifestyle OneDrive Licensing Print Server IT budget Hard Disk Drive Legislation Worker Commute Administrator Reliable Computing Workers Hiring/Firing hacker Compliance Tablets Video Games Ebay Distributed Denial of Service Blockchain Bloatware Comparison Computing Access Updates Smart Technology HBO Inbound Marketing NFL Mobile Device Specifications Nokia Files Gift Giving Branding Microsoft Word Data Protection Value Word Youtube SaaS Mouse iOS Conferencing 3D Printing Robot Chromecast Advertising Microblogging Surge Protector WIndows 7 Device Security Scam IT Management Upgrades Windows Ink Scalability Network Congestion Computer Fan Regulations Gifts Experience Data storage PDF Bluetooth Hard Drive Screen Mirroring Devices Employer Employee Relationship WIndows Server 2008 Consultant junk Google Maps How To Cameras Credit Cards Music Text Messaging Webinar SharePoint Images Cast User Spyware Patch Management Touchscreen filter Data Loss Virtual Desktop Monitors Presentation FAQ Books Touchpad Community Teamwork Best Available Fraud ISP Sync Webinar Intrantet Black Market Science Nanotechnology Charger Electronic Medical Records Blogging Debate Tutorial Help Desk Edge Training IT solutions Microsoft Excel Buisness Root Cause Analysis Wireless Charging Operating Sysytem Running Cable Ciminal Company Culture Adobe Windows 10s File Sharing Near Field Communication Data Breach Co-managed IT Display Project Management Applications Solid State Drive Amazon