Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Keep Bring Your Own Device From Becoming Bring Your Own Disaster

Keep Bring Your Own Device From Becoming Bring Your Own Disaster

Do you let your employees bring their own devices in for use on your company network or Wi-Fi connection? If so, we’re sure that they love the freedom that you provide for them, but we must warn you of the dangers that this can bring to an otherwise careful business. We’ll discuss some of the benefits, as well as the pitfalls, of allowing your employees to use personal devices in the workplace.

Continue reading
0 Comments

How to Handle an Employee that Wants to Use their Smartphone at Work

b2ap3_thumbnail_bring_your_own_device_400.jpgRecently, we’ve been approached by clients asking us about an employee wanting to set up their company email on their iPhone. The business owner thought, “Hey, that’s great! They’re getting more work done and I don’t need to pay for the phone or the service.” We then brought up a crucial point: “What happens when your employee leaves the company or loses their smartphone?”

Continue reading
0 Comments

BYOD Privacy: When Two Phones are Better Than One

b2ap3_thumbnail_bring_your_own_device_400.jpgBring Your Own Device (BYOD) has been a hot IT trend for the past few years. Initially, everybody loved the idea of workers using their personal smartphone for work and organizations were quick to adopt BYOD. Now, after years of trying out the policy, companies and employees are having reservations about BYOD, making some even long for the days of Blackberry.

Continue reading
0 Comments

Old Devices Can Compromise Security

b2ap3_thumbnail_device_security_400.jpgAs a responsible business owner, you know that using the latest technology and running updated software is a key component to your company's network security. However, your employees may not value the latest tech like you do, which could result in a major data breach, despite your best efforts to keep your company current.

Recent comment in this post
BOGNA Cook
I tried out the new edu birdie and i have to say the way that it was promoted it didnt much offer that in return it was quiet a di... Read More
Thursday, 12 July 2018 16:14
Continue reading
1 Comment

Old Mobile Devices Might Be Hurting Your Business’s Security

b2ap3_thumbnail_old_tech_security_risk_400.jpgOne of the greatest things about today's technology is that it has grown more mobile, and some employees like to bring their own devices from home to use for their workplace. This is called BYOD, and while it is useful sometimes, it might be putting your business at risk.

Continue reading
0 Comments

Is Your Business Ready for the Security Challenges of Wearable Tech?

b2ap3_thumbnail_wearable_security_400.jpgDue to the growing popularity of employees using their personal devices in the workplace (BYOD), many companies have created BYOD policies to handle the unique security threats brought about by these devices. Does the new trend of wearable technology mean that you need a separate WYOD policy?

Continue reading
0 Comments

2 of the Biggest Risks Associated with BYOD

b2ap3_thumbnail_bring_your_own_device_policy_400.jpgOne of the most popular business technology trends that we're seeing is employees bringing their own devices into the workplace (BYOD). This trend is due to the popularity of mobile devices (owned by over half of all U.S. adults). While this trend benefits companies in many ways like enhancing mobility, implementing BYOD for a business is not without risks.

Continue reading
0 Comments

5 BYOD Risks for Your Business

b2ap3_thumbnail_bringit400.jpgIn our last blog article, we introduced the IT trend of employees bringing in their personal devices to work (BYOD). We looked at 5 ways BYOD can help your business, but BYOD is not without risks. In part 2, we will cover five risks BYOD brings to your company's network and what you can to do manage them.

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

SecurityTip of the WeekTechnologyBest PracticesPrivacyCloudInternetMicrosoftSoftwareBusiness ComputingGoogleHackersBusiness ManagementEfficiencyHosted SolutionsProductivityBackupUser TipsInnovationManaged Service ProviderBusinessWorkplace TipsMalwareMobile DevicesIT ServiceswindowsComputerHardwareUpgradeNetwork SecurityEmailCommunicationIT SupportMiscellaneousSaving MoneyProductivityDataVirtualizationSmartphonesGadgetsWindows 10Disaster RecoveryBusiness ContinuitySmartphoneAppsVoIPServerBrowserSmall BusinessNetworkMobile Device ManagementMicrosoft OfficeMobile ComputingSocial MediaInformation TechnologyTech TermAndroidQuick TipsPasswordsHealthCybersecurityMobile OfficeHolidayGoing GreenOperating SystemData BackupWindows 10ChromeSave MoneyOffice 365AlertBest PracticeCollaborationCybercrimeData RecoveryOutsourced ITcommunicationsOfficeApplicationspamAppUsersData SecurityInternet of ThingsRansomwareBYODEmployer-Employee RelationshipMarketingSearchLaw EnforcementManaged IT ServicesAppleVendor ManagementWiFiBring Your Own DeviceRemote ComputingTabletThe Internet of ThingsWearable TechnologyFacebookSaving TimeUser ErrorRemote MonitoringIT SupportHackingMoneyAntivirusUnified Threat ManagementHistoryPhishingAvoiding DowntimeiPhoneMobilityRouterRisk ManagementWireless TechnologyBDRCost ManagementMaintenancePasswordBandwidthCloud ComputingComputersData ManagementCustomer Relationship ManagementSocialTelephone SystemsIT SolutionsTech SupportBig DataHard DrivesAutomationEncryptionOneNoteGovernmentOffice TipsFirewallUnsupported SoftwareLithium-ion batteryShortcutWi-FiCurrent EventsVulnerabilityNetworkingVPNHumorWebsiteNet NeutralityGoogle DriveInformationPrinterArtificial IntelligenceBudgetOutlookPhone SystemGmailUSBPowerPointAnalyticsTwo-factor AuthenticationWirelessSocial NetworkingUpdateProactive ITTrendingExcelAuditVirusWork/Life BalanceApplicationsadministrationIntranetMeetingsLaptopTravelAugmented RealityMobile DeviceContent FilteringPoliticsDisasterBlockchainSocial EngineeringEducationTelevisionRetailEntertainmentManaged ITRecoveryIT COnsultantPersonal InformationComputer RepairIdentity TheftManaged IT ServicesStreaming MediaWireless CharginghackerOnline CurrencyAccess ControlMobile SecurityHard DriveUninterrupted Power SupplySalesData BreachHosted SolutionBusiness IntelligenceProject ManagementLegalCortanaTransportationCustomer ServiceCommerceHybrid CloudEvernoteEnd of SupportTelephonyBiometricsFlexibilityPoint of SaleVirtual RealityPrivate CloudPrinter ServerHIPAAProgrammingData StorageWindows 8ScamTwitterInternet ExlporerHuman ResourcesDDoSInstant MessagingDisplayEmailsData ProtectionWordAmazonPaperless OfficeGoogle AssistantConferencingWannaCryIT ManagementSportsBenefitsTouchscreenFax ServereWasteComputer AccessoriesManaged ServiceSamsungDevicesComputingBatteryValueSaaSPatch ManagementAutomobileCleaningHaaSFraudGoogle DocsManaging StressSave TimeStorageBusiness TechnologyComputer CareBreak/FixMicrosoft ExcelAdministratorSharePointUserSolid State DriveMicrobloggingApp storeWorker CommuteSettingsfilterMemoryKeyboardVirtual DesktopPresentationTestingCiminalVideo GamesAdobeMedical ITFile SharingAccessTeamworkBest AvailableHard Disk DriveScienceFinancialHiring/FiringCameraAdminIdentityImagesWebinarCommunitySmart TechnologyISPLicensingIntrantetBuisnessProjectsIT budgetKeyboard ShortcutsData PrivacyLegislationRobotRunning CableBloggingVirtual AssistantTutorialWorkersAdvertisingTabletsNear Field CommunicationWindows 7ScalabilityPayrollChromebookExperienceHelp DeskComparisonData storageiOSDebateAlexa for BusinessUpdatesPDFHBONFLIT consultingCo-Managed ServicesUpgradesIdentitiesHow ToSecurity CamerasCo-managed ITPrintingMusicSpecificationsComputer FanScreen MirroringEmployer Employee RelationshipMicrosoft WordText MessagingReliable ComputingTelephoneConsultantLanguageMachine LearningComplianceBooksTouchpadDistributed Denial of ServiceOneDriveBloatwareCastSoftware as a ServicePrint ServerDevice SecurityWindows InkLifestyleHyperlinkBlack MarketDowntimeInbound MarketingComputer ForensicsElectronic Medical RecordsGiftsMonitorsEbayWIndows Server 2008FilesGoogle MapsBrandingWasting TimeWebinarProactiveE-CommerceManagementSafetyCredit CardsOperating SysytemMouseNanotechnologyVendorTrainingSpywareChromecastData LossWIndows 7AccessoryIT solutionsWebsitesPayment CardsWireless InternetFAQNetwork CongestionRoot Cause AnalysisNokiaRegulationsEmployee-Employer RelationshipCompany CultureSyncBluetoothGift Giving3D PrintingPeripheralWindows 10sData TheftEmployeeYoutubejunkGamificationSurge ProtectorChargerReputationCamerasEdge