Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Has Malware Made a Home in Your Router?

Has Malware Made a Home in Your Router?

Hackers and cybercriminals, like most people, tend to gravitate towards high-reward activities. In this case, that means that focus is turning to creating malware that attacks the router, potentially infecting the users that leverage it to connect wirelessly to the Internet. Researchers at Kaspersky Lab recently discovered an example of such a malware, so today, we will review this threat and how to best protect your network.

Continue reading
0 Comments

The Cisco Vulnerability Requires Multiple Patches

The Cisco Vulnerability Requires Multiple Patches

Virtual private networks are vulnerable to an exploit that was recently brought to light. Cisco has announced that this exploit undermines its ASA, or Adaptive Security Appliance tool. If this issue isn’t patched immediately, you could find your organization vulnerable through remote code exploitation.

Continue reading
0 Comments

Links Discovered Between WannaCry and North Korea

Links Discovered Between WannaCry and North Korea

In a statement given by Tom Bossert, the homeland security adviser to the White House, blame for the WannaCry attacks leveraged from May 12th to the 15th in 2017 was attributed to the Democratic People’s Republic of Korea. This assertion is in line with the conclusions that New Zealand, Australia, Canada, and Japan have come to, according to Bossert.

Continue reading
0 Comments

Are You Prepared To Deal With These EOL Events?

Are You Prepared To Deal With These EOL Events?

Using the most up-to-date versions of your technology’s operating systems is one of the best ways to stay secure. Yet, some organizations forego the jump to more recent operating systems due to the immense up-front expense represented by upgrading multiple servers or workstations at once. Unfortunately, this can be detrimental to your organization’s security, and potentially even put your business’s future at risk.

Continue reading
0 Comments

Is Combining Mobile Apps and ATMs a Good Idea?

Is Combining Mobile Apps and ATMs a Good Idea?

ATMs are, surprisingly enough, not the most secure pieces of technology out there, though there are efforts to improve security by taking advantage of mobile devices. Granted, this won’t be enough to protect against the considerable vulnerabilities in ATMs. In order to maximize security and minimize the amount of damage done by vulnerabilities, the user needs to understand how to protect themselves while using ATMs.

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

SecurityTip of the WeekTechnologyBest PracticesPrivacyInternetCloudMicrosoftSoftwareBusiness ComputingBusiness ManagementGoogleEfficiencyHackersProductivityHosted SolutionsBackupManaged Service ProviderUser TipsInnovationMalwareBusinessWorkplace TipsMobile DevicesIT ServicesComputerHardwarewindowsUpgradeNetwork SecurityIT SupportSaving MoneyMiscellaneousEmailSmartphonesVirtualizationDataWindows 10Business ContinuityCommunicationAppsSmartphoneGadgetsProductivityDisaster RecoveryVoIPMicrosoft OfficeServerBrowserNetworkMobile Device ManagementInformation TechnologyMobile ComputingSmall BusinessTech TermQuick TipsAndroidSocial MediaPasswordsHealthHolidayData BackupGoing GreenOperating SystemCybersecurityMobile OfficeChromeSave MoneyOffice 365CybercrimecommunicationsAppApplicationOfficeAlertBest PracticeCollaborationspamWindows 10Data RecoveryOutsourced ITBYODMarketingRansomwareEmployer-Employee RelationshipLaw EnforcementManaged IT ServicesAppleUsersVendor ManagementWiFiRemote ComputingThe Internet of ThingsTabletSearchInternet of ThingsData SecurityWearable TechnologyHistoryMoneyIT SupportBring Your Own DeviceHackingRouteriPhonePhishingWireless TechnologyBDRRisk ManagementMobilityCost ManagementFacebookUser ErrorRemote MonitoringMaintenanceSaving TimeUnified Threat ManagementAntivirusAvoiding DowntimeOffice TipsPasswordIT SolutionsTech SupportBig DataData ManagementComputersEncryptionSocialHard DrivesTelephone SystemsOneNoteGovernmentBandwidthCustomer Relationship ManagementHumorTwo-factor AuthenticationCloud ComputingWebsiteUpdateWi-FiNet NeutralityVulnerabilityPrinterOutlookShortcutGoogle DriveGmailUSBArtificial IntelligencePowerPointNetworkingAnalyticsProactive ITFirewallSocial NetworkingBudgetWirelessLithium-ion batteryCurrent EventsPhone SystemAutomationUnsupported SoftwareVPNDisasterMobile DeviceEducationTelevisionRetailExcelPoliticsTravelApplicationsSocial EngineeringIT COnsultantManaged ITStreaming MediaComputer RepairTrendingBlockchainAuditIdentity TheftIntranetVirusInformationManaged IT ServicesRecoveryLaptopAugmented RealityContent FilteringadministrationWork/Life BalanceManaged ServiceDevicesProgrammingManaging StressLegalTwitterTransportationStoragePatch ManagementEnd of SupportCommerceFlexibilityDisplayAmazonWindows 8Paperless OfficeFraudGoogle DocsHosted SolutionScamBusiness IntelligenceFax ServerBusiness TechnologyData StorageMeetingsTelephonyWireless ChargingCustomer ServiceComputingBiometricsAccess ControlMobile SecurityPrivate CloudWannaCryData BreachVirtual RealityProject ManagementTouchscreenCortanaHIPAAInternet ExlporerEvernoteHuman ResourcesSamsungDDoSBatteryEmailsInstant MessagingPersonal InformationAutomobileOnline CurrencyEntertainmentSportsCleaningBenefitseWasteComputer AccessoriesSave TimeData ProtectionComputer CareWordUninterrupted Power SupplySalesHard DriveGoogle AssistantSaaSValuePoint of SalehackerPrinter ServerHaaSHiring/FiringWIndows Server 2008RegulationsProactiveBluetoothGoogle MapsWasting TimeManagementCredit CardsjunkSmart TechnologyCamerasCo-managed ITVendorSpywareWebsitesSharePointData LossUserDebateAccessoryHelp DeskRobotWireless InternetFAQfilterSyncPresentationAdvertisingEmployee-Employer RelationshipVirtual DesktopData TheftTeamworkOneDriveBest AvailableScalabilityPeripheralPrint ServerData storageGamificationiOSChargerScienceExperiencePDFEdgeApp storeUpgradesMicrosoft ExcelHow ToEbayMemoryComputer FanMusicEmployer Employee RelationshipAdobeLifestyleText MessagingTestingScreen MirroringCiminalBuisnessRunning CableConsultantFile SharingTouchpadFinancialBooksNear Field CommunicationCameraCastAdminIdentityBlack MarketHybrid CloudMonitorsElectronic Medical Records3D PrintingLicensingIT consultingProjectsSurge ProtectorIT budgetKeyboard ShortcutsData PrivacyWebinarLegislationNokiaOperating SysytemVirtual AssistantNanotechnologyWorkersSafetyTrainingTabletsReliable ComputingGift GivingWindows 7PayrollChromebookDistributed Denial of ServiceIT solutionsComparisonComplianceYoutubeAlexa for BusinessRoot Cause AnalysisUpdatesBloatwareHBOSecurity CamerasCompany CultureNFLMicrobloggingCo-Managed ServicesIdentitiesPrintingWindows 10sSpecificationsInbound MarketingReputationCommunityFilesMicrosoft WordLanguageMachine LearningBrandingISPTelephoneSolid State DriveConferencingIntrantetMouseWorker CommuteAdministratorIT ManagementSoftware as a ServiceChromecastSettingsDevice SecurityKeyboardWindows InkWIndows 7Video GamesBloggingWebinarHyperlinkTutorialImagesComputer ForensicsHard Disk DriveGiftsNetwork CongestionAccess