Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Understanding Biometrics

Understanding Biometrics

It’s a familiar scene from many science fiction properties: a person approaches a locked door. They unlock it, but rather than using a key, a red beam scans their eye to confirm their identity and permit them access. The thing is, this and similar biometric authentication technologies are likely to begin appearing in real-world businesses sooner than later. Let’s discuss:

Continue reading
0 Comments

How to Make Sure Your Messages are Secure

How to Make Sure Your Messages are Secure

Messaging applications have carved out a foothold in businesses, clearly proving their operational benefits. However, it simply isn’t responsible to leverage a solution without making sure that the solution is secure. There are a few criteria that you should consider to determine how secure your chosen application really is.

Continue reading
0 Comments

Social Media Can Cause Security Concerns

Social Media Can Cause Security Concerns

Social media is a great tool that your business can use to communicate with clients and prospective customers, but in an age where you can expect your employees to have their own accounts, it can be devastating to overlook the security issues associated with it. Today, we’ll examine how you can protect your organization from its employees’ social media use.

Continue reading
0 Comments

What You Should Know About Securing Payment Cards

What You Should Know About Securing Payment Cards

Cards are one of the most common methods of making payments these days, as it’s simply more convenient than carrying a ton of cash on you at any given time. Still, if your business takes card payments, it puts you in a place of vulnerability. Considering how often payment cards are used for transactions, you need to take action now to keep your company from experiencing data breaches related to payment information.

Continue reading
0 Comments

Contemporary Cyber Threats You Should Know

Contemporary Cyber Threats You Should Know

Cybersecurity is a critical part of managing any business. This is especially true nowadays when there are countless individuals and organizations formed specifically to steal credentials and sensitive information from your organization. Today we will be dedicating some time to how your business can reinforce proper cybersecurity practices.

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Cloud Internet Microsoft Software Business Computing Google Hackers Business Management Efficiency Productivity Hosted Solutions User Tips Innovation Backup Managed Service Provider Workplace Tips Malware Business Mobile Devices IT Services windows Computer Hardware Network Security Upgrade Email Communication IT Support Miscellaneous Saving Money Productivity Data Virtualization Smartphones Gadgets Windows 10 Business Continuity Smartphone Apps Disaster Recovery Browser VoIP Server Small Business Network Microsoft Office Mobile Device Management Social Media Mobile Computing Tech Term Information Technology Health Quick Tips Passwords Android Cybersecurity Operating System Mobile Office Going Green Holiday Data Backup Office 365 Chrome Windows 10 Save Money Application Office App spam Alert Best Practice Collaboration Cybercrime Outsourced IT communications Internet of Things Ransomware Employer-Employee Relationship Data Security Users Law Enforcement Managed IT Services BYOD Marketing Data Recovery Search Wearable Technology The Internet of Things Apple Vendor Management Facebook WiFi Bring Your Own Device Remote Computing Tablet Maintenance Saving Time Router Wireless Technology Mobility BDR History User Error Remote Monitoring Unified Threat Management Antivirus IT Support Money Avoiding Downtime Hacking iPhone Phishing Risk Management Cost Management Tech Support Big Data Encryption Customer Relationship Management OneNote Government Automation Bandwidth Office Tips Password Cloud Computing Data Management Computers Hard Drives Social IT Solutions Telephone Systems Outlook Artificial Intelligence Gmail USB Budget PowerPoint Analytics Phone System Proactive IT Firewall Wireless Two-factor Authentication Information Update Lithium-ion battery Current Events Unsupported Software Wi-Fi Shortcut VPN Humor Website Vulnerability Net Neutrality Networking Google Drive Printer Social Networking Applications Virus Managed IT Entertainment administration Recovery Blockchain Personal Information Streaming Media Disaster Identity Theft Trending Managed IT Services Audit Intranet Work/Life Balance Excel Laptop Augmented Reality Content Filtering Mobile Device Meetings Politics Travel IT COnsultant Education Television Computer Repair Retail Social Engineering Access Control Human Resources Fax Server Mobile Security DDoS Instant Messaging Emails WannaCry Data Breach Project Management Computing Touchscreen Cortana Hard Drive Sports Uninterrupted Power Supply Hybrid Cloud Sales Evernote Samsung Benefits Computer Accessories eWaste Battery Value SaaS Automobile Cleaning HaaS Save Time Data Protection Online Currency Windows 8 Computer Care Word Managing Stress Storage Google Assistant Conferencing IT Management hacker Devices Managed Service Point of Sale Legal Hosted Solution Transportation Printer Server Commerce Patch Management End of Support Business Intelligence Flexibility Telephony Customer Service Programming Twitter Fraud Biometrics Google Docs Private Cloud Virtual Reality Display Data Storage Scam Amazon Business Technology HIPAA Paperless Office Internet Exlporer Wireless Charging Youtube Screen Mirroring Ciminal Employer Employee Relationship Adobe Text Messaging IT consulting Testing Medical IT Consultant File Sharing Books Touchpad Ebay Financial Microblogging Cast Admin Reliable Computing Camera Compliance Identity Distributed Denial of Service Black Market Electronic Medical Records Bloatware Monitors IT budget Keyboard Shortcuts Licensing Projects Inbound Marketing Data Privacy Webinar Legislation Images Files Safety Operating Sysytem Virtual Assistant Webinar Nanotechnology Workers Windows 7 Payroll Training Tablets Branding 3D Printing Mouse Chromebook Surge Protector IT solutions Comparison Root Cause Analysis Updates Chromecast HBO Alexa for Business Co-Managed Services Identities Security Cameras Company Culture NFL WIndows 7 Network Congestion Printing Windows 10s Specifications Microsoft Word Help Desk Reputation Regulations Debate Telephone Language Machine Learning Bluetooth Worker Commute Administrator junk Solid State Drive Settings Device Security Keyboard Cameras Software as a Service User Hyperlink Community Downtime Windows Ink SharePoint Video Games Access ISP filter Computer Forensics Hard Disk Drive Gifts Hiring/Firing WIndows Server 2008 Virtual Desktop Intrantet Presentation Best Available Wasting Time Proactive E-Commerce Google Maps Teamwork Science Lifestyle Blogging Management Tutorial Credit Cards Spyware Smart Technology Vendor Accessory Websites Payment Cards Data Loss Robot Wireless Internet FAQ Sync Buisness Advertising Employee-Employer Relationship Peripheral Co-managed IT Data Theft Employee Running Cable Scalability Experience Data storage Gamification iOS Charger Edge PDF Near Field Communication Nokia App store Break/Fix Upgrades Microsoft Excel How To Music OneDrive Gift Giving Memory Print Server Computer Fan