Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Keep Bring Your Own Device From Becoming Bring Your Own Disaster

Keep Bring Your Own Device From Becoming Bring Your Own Disaster

Do you let your employees bring their own devices in for use on your company network or Wi-Fi connection? If so, we’re sure that they love the freedom that you provide for them, but we must warn you of the dangers that this can bring to an otherwise careful business. We’ll discuss some of the benefits, as well as the pitfalls, of allowing your employees to use personal devices in the workplace.

Continue reading
0 Comments

How to Handle an Employee that Wants to Use their Smartphone at Work

b2ap3_thumbnail_bring_your_own_device_400.jpgRecently, we’ve been approached by clients asking us about an employee wanting to set up their company email on their iPhone. The business owner thought, “Hey, that’s great! They’re getting more work done and I don’t need to pay for the phone or the service.” We then brought up a crucial point: “What happens when your employee leaves the company or loses their smartphone?”

Continue reading
0 Comments

BYOD Privacy: When Two Phones are Better Than One

b2ap3_thumbnail_bring_your_own_device_400.jpgBring Your Own Device (BYOD) has been a hot IT trend for the past few years. Initially, everybody loved the idea of workers using their personal smartphone for work and organizations were quick to adopt BYOD. Now, after years of trying out the policy, companies and employees are having reservations about BYOD, making some even long for the days of Blackberry.

Continue reading
0 Comments

Old Devices Can Compromise Security

b2ap3_thumbnail_device_security_400.jpgAs a responsible business owner, you know that using the latest technology and running updated software is a key component to your company's network security. However, your employees may not value the latest tech like you do, which could result in a major data breach, despite your best efforts to keep your company current.

Recent comment in this post
BOGNA Cook
I tried out the new edu birdie and i have to say the way that it was promoted it didnt much offer that in return it was quiet a di... Read More
Thursday, 12 July 2018 16:14
Continue reading
1 Comment

Old Mobile Devices Might Be Hurting Your Business’s Security

b2ap3_thumbnail_old_tech_security_risk_400.jpgOne of the greatest things about today's technology is that it has grown more mobile, and some employees like to bring their own devices from home to use for their workplace. This is called BYOD, and while it is useful sometimes, it might be putting your business at risk.

Continue reading
0 Comments

Is Your Business Ready for the Security Challenges of Wearable Tech?

b2ap3_thumbnail_wearable_security_400.jpgDue to the growing popularity of employees using their personal devices in the workplace (BYOD), many companies have created BYOD policies to handle the unique security threats brought about by these devices. Does the new trend of wearable technology mean that you need a separate WYOD policy?

Continue reading
0 Comments

2 of the Biggest Risks Associated with BYOD

b2ap3_thumbnail_bring_your_own_device_policy_400.jpgOne of the most popular business technology trends that we're seeing is employees bringing their own devices into the workplace (BYOD). This trend is due to the popularity of mobile devices (owned by over half of all U.S. adults). While this trend benefits companies in many ways like enhancing mobility, implementing BYOD for a business is not without risks.

Continue reading
0 Comments

5 BYOD Risks for Your Business

b2ap3_thumbnail_bringit400.jpgIn our last blog article, we introduced the IT trend of employees bringing in their personal devices to work (BYOD). We looked at 5 ways BYOD can help your business, but BYOD is not without risks. In part 2, we will cover five risks BYOD brings to your company's network and what you can to do manage them.

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

SecurityTip of the WeekTechnologyBest PracticesPrivacyInternetCloudMicrosoftSoftwareBusiness ComputingBusiness ManagementEfficiencyHackersGoogleProductivityHosted SolutionsBackupUser TipsManaged Service ProviderInnovationWorkplace TipsMalwareBusinessMobile DevicesIT ServicesHardwareComputerwindowsUpgradeNetwork SecurityIT SupportSaving MoneyMiscellaneousEmailDataVirtualizationWindows 10SmartphonesAppsGadgetsBusiness ContinuitySmartphoneCommunicationProductivityDisaster RecoveryVoIPServerMobile Device ManagementNetworkBrowserMicrosoft OfficeSmall BusinessMobile ComputingTech TermInformation TechnologyAndroidQuick TipsPasswordsHealthSocial MediaHolidayData BackupCybersecurityOperating SystemMobile OfficeGoing GreenChromeCollaborationSave MoneyCybercrimeOffice 365communicationsApplicationOfficeAppspamAlertBest PracticeMarketingData RecoveryOutsourced ITRansomwareEmployer-Employee RelationshipLaw EnforcementData SecurityManaged IT ServicesBYODWindows 10TabletSearchRemote ComputingWearable TechnologyInternet of ThingsAppleUsersVendor ManagementThe Internet of ThingsWiFiiPhoneAvoiding DowntimeHackingRisk ManagementCost ManagementPhishingMaintenanceSaving TimeMobilityRouterWireless TechnologyBDRHistoryFacebookBring Your Own DeviceUser ErrorIT SupportMoneyRemote MonitoringUnified Threat ManagementAntivirusPasswordHard DrivesData ManagementComputersSocialTelephone SystemsIT SolutionsTech SupportBig DataCustomer Relationship ManagementEncryptionOneNoteGovernmentBandwidthOffice TipsCurrent EventsVulnerabilityVPNShortcutHumorGoogle DriveWebsiteNet NeutralitySocial NetworkingArtificial IntelligenceNetworkingPrinterOutlookGmailUSBBudgetWirelessPowerPointAnalyticsPhone SystemAutomationProactive ITFirewallUnsupported SoftwareTwo-factor AuthenticationCloud ComputingWi-FiUpdateLithium-ion batteryMobile DeviceAugmented RealityPoliticsExcelLaptopContent FilteringIT COnsultantComputer RepairTravelTelevisionEducationRetailSocial EngineeringManaged ITVirusApplicationsPersonal InformationadministrationIdentity TheftBlockchainManaged IT ServicesRecoveryDisasterStreaming MediaInformationWork/Life BalanceTrendingAuditIntranetManaged ServiceDevicesFlexibilityPoint of SalePatch ManagementHosted SolutionPrinter ServerData StorageScamBusiness IntelligenceFraudMeetingsTwitterTelephonyCustomer ServiceProgrammingGoogle DocsBiometricsBusiness TechnologyPrivate CloudVirtual RealityDisplayAccess ControlWannaCryAmazonWireless ChargingHIPAAPaperless OfficeTouchscreenInternet ExlporerMobile SecurityData BreachSamsungHuman ResourcesBatteryDDoSUninterrupted Power SupplySalesProject ManagementHard DriveFax ServerInstant MessagingEmailsCortanaComputingEvernoteAutomobileCleaningSportsEntertainmentBenefitseWasteComputer AccessoriesSave TimeComputer CareSaaSValuehackerWindows 8Data ProtectionHaaSWordOnline CurrencyGoogle AssistantManaging StressLegalTransportationStorageCommerceEnd of SupportUserCommunityWIndows Server 2008SharePointLifestyleWasting TimeRobotISPProactivefilterGoogle MapsCredit CardsAdvertisingVirtual DesktopIntrantetManagementPresentationVendorBest AvailableSpywareScalabilityTeamworkTutorialExperienceAccessoryData storageScienceWebsitesBloggingData LossiOSFAQPDFWireless InternetEmployee-Employer RelationshipSyncUpgradesHow ToMusicPeripheralData TheftComputer FanChargerScreen MirroringEmployer Employee RelationshipText MessagingBuisnessNokiaGamificationRunning CableGift GivingEdgeCo-managed ITConsultantBooksTouchpadYoutubeApp storeMicrosoft ExcelNear Field CommunicationCastMemoryTestingMicrobloggingCiminalAdobeBlack MarketMonitorsPrint ServerElectronic Medical RecordsOneDriveFile SharingAdminIT consultingFinancialCameraWebinarNanotechnologySafetyOperating SysytemIdentityEbayKeyboard ShortcutsReliable ComputingTrainingHybrid CloudDistributed Denial of ServiceProjectsWebinarIT budgetComplianceImagesLicensingIT solutionsPayrollRoot Cause AnalysisBloatwareData PrivacyLegislationVirtual AssistantWorkersCompany CultureWindows 7Inbound MarketingTabletsWindows 10sComparisonSecurity CamerasFilesReputationChromebookAlexa for Business3D PrintingUpdatesHBOBrandingWorker CommuteCo-Managed ServicesAdministratorMouseDebateIdentitiesHelp DeskNFLSolid State DriveSurge ProtectorSpecificationsMachine LearningSettingsKeyboardChromecastPrintingWIndows 7Microsoft WordVideo GamesTelephoneAccessNetwork CongestionLanguageHard Disk DriveConferencingHiring/FiringRegulationsSoftware as a ServiceDevice SecurityIT ManagementBluetoothHyperlinkjunkWindows InkGiftsSmart TechnologyComputer ForensicsCameras