Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How to Prevent a Virtual Assistant from Compromising Your Security

How to Prevent a Virtual Assistant from Compromising Your Security

Virtual assistants have a lot of promise as a productivity tool, so it only makes sense that they would begin to appear in the workplace. Unfortunately, these devices have also gained a reputation as a security risk. Whether or not you’ve considered bringing virtual assistants into your business, you need to prepare for their presence there.

Continue reading
0 Comments

Checking Up on Medical IT in 2019

Checking Up on Medical IT in 2019

The healthcare industry has been trying to make the jump to digital for over a decade. While many practices have been able to successfully implement electronic health record (EHR) technologies, a full digital transformation has eluded many others. Nowadays, providers are actively searching for ways to achieve measurable results with these newer technology implementations. Today, we take a look at the healthcare industry’s IT as it stands in early 2019.

Continue reading
0 Comments

The Hybrid Cloud’s Usefulness to the Modern Business

The Hybrid Cloud’s Usefulness to the Modern Business

Cloud computing has revolutionized the way business is done, but most businesses don’t always feel comfortable storing data and hosting critical infrastructure in the cloud. Every business has to determine what kind of computing infrastructure is right for them. Many businesses today have decided to spread their technology investments around as they attempt to find solutions for all types of operational needs.

Continue reading
0 Comments

How to Set Up a Gmail Auto-Response

How to Set Up a Gmail Auto-Response

These days, our society is infamously connected, especially in the business sense. This can make it jarring to not receive a reply back from an email. While we all need a break every now and then, we also need to get back to our contacts efficiently - this is where the ‘out of office’ message in Gmail comes in.

Continue reading
0 Comments

Here are 5 Solid IoT Trends for 2019

Here are 5 Solid IoT Trends for 2019

The Internet of Things is simultaneously the most remarkable and the most dangerous current IT trend. This is because it promotes the use of connected devices, while not supplying the integrated security necessary to keep all these new endpoints from stretching an organization’s network security thin. Today, we will look at five trending topics for the IoT, and what they mean for a business like yours.

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Cloud Internet Microsoft Software Business Computing Google Business Management Hackers Efficiency Productivity Hosted Solutions User Tips Innovation Backup Managed Service Provider Malware Business Workplace Tips Mobile Devices IT Services Computer Hardware windows Upgrade Network Security Communication IT Support Miscellaneous Saving Money Email Productivity Data Virtualization Smartphones Windows 10 Gadgets Business Continuity Apps Smartphone Disaster Recovery VoIP Server Browser Microsoft Office Small Business Network Mobile Device Management Tech Term Information Technology Mobile Computing Social Media Quick Tips Passwords Health Android Cybersecurity Going Green Operating System Data Backup Mobile Office Holiday Windows 10 Office 365 Save Money Chrome Cybercrime Outsourced IT communications App Application Office Alert Best Practice Collaboration spam BYOD Marketing Data Recovery Search Internet of Things Ransomware Employer-Employee Relationship Data Security Law Enforcement Users Managed IT Services Bring Your Own Device The Internet of Things Tablet Facebook Wearable Technology Apple Vendor Management WiFi Remote Computing Money IT Support Hacking iPhone Router Wireless Technology Phishing BDR Risk Management Cost Management User Error Remote Monitoring Maintenance Mobility Saving Time Antivirus Unified Threat Management Avoiding Downtime History Password IT Solutions Cloud Computing Tech Support Computers Big Data Data Management Encryption Social Hard Drives Telephone Systems OneNote Government Bandwidth Automation Customer Relationship Management Office Tips Unsupported Software Printer Wi-Fi Shortcut Outlook Vulnerability Gmail USB Networking PowerPoint Analytics Google Drive Proactive IT Firewall Social Networking Artificial Intelligence Lithium-ion battery Budget Current Events Phone System Wireless VPN Two-factor Authentication Information Humor Website Net Neutrality Update Television Education Retail Excel Work/Life Balance Mobile Device Meetings Travel Politics IT COnsultant Social Engineering Streaming Media Computer Repair Trending Applications Audit Managed IT Entertainment Intranet Recovery Virus Laptop Blockchain Augmented Reality Personal Information Content Filtering administration Identity Theft Managed IT Services Disaster Display Amazon Windows 8 Managed Service Paperless Office Devices Legal Transportation Hosted Solution Patch Management End of Support Business Intelligence Fax Server Commerce Flexibility Customer Service Computing Telephony Fraud Biometrics Google Docs Virtual Reality Private Cloud Data Storage Scam Business Technology HIPAA Internet Exlporer Wireless Charging Access Control Human Resources Mobile Security DDoS Instant Messaging Emails WannaCry Data Breach Project Management Online Currency Touchscreen Cortana Sports Hybrid Cloud Evernote Samsung Benefits Computer Accessories eWaste Battery Sales Hard Drive Uninterrupted Power Supply Value SaaS Automobile Cleaning Point of Sale Printer Server HaaS Save Time Data Protection Twitter Computer Care Word Programming Managing Stress Storage Google Assistant Conferencing IT Management hacker Downtime Debate Windows Ink Help Desk SharePoint Video Games User Hyperlink Access filter Computer Forensics Hard Disk Drive Gifts Hiring/Firing WIndows Server 2008 Virtual Desktop Presentation Proactive E-Commerce Print Server Google Maps Teamwork OneDrive Best Available Wasting Time Science Management Credit Cards Smart Technology Vendor Spyware Accessory Ebay Websites Payment Cards Data Loss Robot Wireless Internet FAQ Sync Buisness Advertising Employee-Employer Relationship Lifestyle Peripheral Data Theft Employee Running Cable Scalability Data storage Gamification iOS Charger Experience Edge PDF Near Field Communication App store Break/Fix Upgrades Microsoft Excel How To Music 3D Printing Memory Computer Fan Screen Mirroring Ciminal Surge Protector Employer Employee Relationship Adobe Text Messaging IT consulting Testing Medical IT Consultant File Sharing Books Touchpad Financial Nokia Cast Admin Reliable Computing Camera Gift Giving Compliance Identity Youtube Distributed Denial of Service Black Market Electronic Medical Records Bloatware Monitors IT budget Keyboard Shortcuts Microblogging Licensing Projects Inbound Marketing Data Privacy Webinar Legislation Files Safety Operating Sysytem Virtual Assistant Community Nanotechnology Workers Payroll Training Tablets Branding ISP Windows 7 Intrantet Mouse Chromebook IT solutions Comparison Chromecast HBO Alexa for Business Root Cause Analysis Updates Blogging Identities Security Cameras Webinar Tutorial Company Culture NFL Images WIndows 7 Co-Managed Services Network Congestion Printing Windows 10s Specifications Reputation Regulations Microsoft Word Language Machine Learning Bluetooth Telephone Administrator junk Solid State Drive Worker Commute Keyboard Cameras Software as a Service Co-managed IT Settings Device Security