Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Powerful Physical Security Options

Powerful Physical Security Options

Data security isn’t the easiest thing in the world to plan for, especially if your organization doesn’t have any dedicated security professionals on-hand. While protecting your data with traditional methods, like passwords, firewalls, and antivirus, is important, what measures are you taking to make sure a thief or hacker isn’t just walking into your office and making off with your technology?

Continue reading
0 Comments

Why Your Google Account’s Security is So Important

Why Your Google Account’s Security is So Important

These days, it seems that to have a computer is to have a Google account. If one isn’t used for professional purposes, it is used as a personalized solution - and no wonder. The convenience and accessibility of these accounts alone are compelling, even before one considers the versatility that this account brings with it. Unfortunately, these benefits can be quickly overshadowed by risk if a Google account’s security is overlooked, even if unintentionally.

Continue reading
0 Comments

How the Grinch Didn’t Send that Email!

How the Grinch Didn’t Send that Email!

An email’s important,
That much is clear fact -
But you need to stay safe
From an email attack.

Continue reading
0 Comments

Don’t Get Scammed with Gift Cards

Don’t Get Scammed with Gift Cards

It’s the holiday season, and shoppers are flocking to stores to find the perfect gift for anyone: the gift card. However, these handy little plastic rectangles may not be so perfect after all. This year, they’ve been a key component to a business email compromise scam that has been popular in the past few months.

Continue reading
0 Comments

Here’s How Companies Struggle with IT Security

Here’s How Companies Struggle with IT Security

No business can be successful if it’s constantly suffering from data breaches. Therefore, you should take measures to mitigate the issues caused by these threats before they present themselves. Here are four of the biggest issues your business could face in the field of network security.

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

SecurityTip of the WeekTechnologyBest PracticesPrivacyInternetCloudMicrosoftSoftwareBusiness ComputingBusiness ManagementGoogleEfficiencyHackersProductivityHosted SolutionsBackupManaged Service ProviderUser TipsInnovationMalwareBusinessWorkplace TipsMobile DevicesIT ServicesComputerHardwarewindowsUpgradeNetwork SecurityIT SupportSaving MoneyMiscellaneousEmailSmartphonesVirtualizationDataWindows 10Business ContinuityCommunicationAppsSmartphoneGadgetsProductivityDisaster RecoveryVoIPMicrosoft OfficeServerBrowserNetworkMobile Device ManagementInformation TechnologyMobile ComputingSmall BusinessTech TermQuick TipsAndroidSocial MediaPasswordsHealthHolidayData BackupGoing GreenOperating SystemCybersecurityMobile OfficeChromeSave MoneyOffice 365CybercrimecommunicationsAppApplicationOfficeAlertBest PracticeCollaborationspamWindows 10Data RecoveryOutsourced ITBYODMarketingRansomwareEmployer-Employee RelationshipLaw EnforcementManaged IT ServicesAppleUsersVendor ManagementWiFiRemote ComputingThe Internet of ThingsTabletSearchInternet of ThingsData SecurityWearable TechnologyHistoryMoneyIT SupportBring Your Own DeviceHackingRouteriPhonePhishingWireless TechnologyBDRRisk ManagementMobilityCost ManagementFacebookUser ErrorRemote MonitoringMaintenanceSaving TimeUnified Threat ManagementAntivirusAvoiding DowntimeOffice TipsPasswordIT SolutionsTech SupportBig DataData ManagementComputersEncryptionSocialHard DrivesTelephone SystemsOneNoteGovernmentBandwidthCustomer Relationship ManagementHumorTwo-factor AuthenticationCloud ComputingWebsiteUpdateWi-FiNet NeutralityVulnerabilityPrinterOutlookShortcutGoogle DriveGmailUSBArtificial IntelligencePowerPointNetworkingAnalyticsProactive ITFirewallSocial NetworkingBudgetWirelessLithium-ion batteryCurrent EventsPhone SystemAutomationUnsupported SoftwareVPNDisasterMobile DeviceEducationTelevisionRetailExcelPoliticsTravelApplicationsSocial EngineeringIT COnsultantManaged ITStreaming MediaComputer RepairTrendingBlockchainAuditIdentity TheftIntranetVirusInformationManaged IT ServicesRecoveryLaptopAugmented RealityContent FilteringadministrationWork/Life BalanceManaged ServiceDevicesProgrammingManaging StressLegalTwitterTransportationStoragePatch ManagementEnd of SupportCommerceFlexibilityDisplayAmazonWindows 8Paperless OfficeFraudGoogle DocsHosted SolutionScamBusiness IntelligenceFax ServerBusiness TechnologyData StorageMeetingsTelephonyWireless ChargingCustomer ServiceComputingBiometricsAccess ControlMobile SecurityPrivate CloudWannaCryData BreachVirtual RealityProject ManagementTouchscreenCortanaHIPAAInternet ExlporerEvernoteHuman ResourcesSamsungDDoSBatteryEmailsInstant MessagingPersonal InformationAutomobileOnline CurrencyEntertainmentSportsCleaningBenefitseWasteComputer AccessoriesSave TimeData ProtectionComputer CareWordUninterrupted Power SupplySalesHard DriveGoogle AssistantSaaSValuePoint of SalehackerPrinter ServerHaaSHiring/FiringWIndows Server 2008RegulationsProactiveBluetoothGoogle MapsWasting TimeManagementCredit CardsjunkSmart TechnologyCamerasCo-managed ITVendorSpywareWebsitesSharePointData LossUserDebateAccessoryHelp DeskRobotWireless InternetFAQfilterSyncPresentationAdvertisingEmployee-Employer RelationshipVirtual DesktopData TheftTeamworkOneDriveBest AvailableScalabilityPeripheralPrint ServerData storageGamificationiOSChargerScienceExperiencePDFEdgeApp storeUpgradesMicrosoft ExcelHow ToEbayMemoryComputer FanMusicEmployer Employee RelationshipAdobeLifestyleText MessagingTestingScreen MirroringCiminalBuisnessRunning CableConsultantFile SharingTouchpadFinancialBooksNear Field CommunicationCameraCastAdminIdentityBlack MarketHybrid CloudMonitorsElectronic Medical Records3D PrintingLicensingIT consultingProjectsSurge ProtectorIT budgetKeyboard ShortcutsData PrivacyWebinarLegislationNokiaOperating SysytemVirtual AssistantNanotechnologyWorkersSafetyTrainingTabletsReliable ComputingGift GivingWindows 7PayrollChromebookDistributed Denial of ServiceIT solutionsComparisonComplianceYoutubeAlexa for BusinessRoot Cause AnalysisUpdatesBloatwareHBOSecurity CamerasCompany CultureNFLMicrobloggingCo-Managed ServicesIdentitiesPrintingWindows 10sSpecificationsInbound MarketingReputationCommunityFilesMicrosoft WordLanguageMachine LearningBrandingISPTelephoneSolid State DriveConferencingIntrantetMouseWorker CommuteAdministratorIT ManagementSoftware as a ServiceChromecastSettingsDevice SecurityKeyboardWindows InkWIndows 7Video GamesBloggingWebinarHyperlinkTutorialImagesComputer ForensicsHard Disk DriveGiftsNetwork CongestionAccess