Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Smartphones Have New Roles in Business

Smartphones Have New Roles in Business

No doubt you’ve noticed the increased use of smartphones. No matter where you go, people are on their phones. Sometimes they are using them in places you wouldn’t even imagine. For the modern business, employee smartphone usage can be a major pain in the side. Today, we’ll go into how smartphone usage helps and hurts a business and how to go about keeping employees from being on their phones for large chunks of the workday.

Continue reading
0 Comments

Tip of the Week: Bring Your Own Device Policy Considerations

Tip of the Week: Bring Your Own Device Policy Considerations

Bring Your Own Device is a hot trend in today’s business environment, as it creates a ton of opportunities for businesses to cut costs. However, this is only true if you implement a BYOD policy that your organization can take advantage of, as it creates considerable problems for your unprepared businesses.

Continue reading
0 Comments

Keep Bring Your Own Device From Becoming Bring Your Own Disaster

Keep Bring Your Own Device From Becoming Bring Your Own Disaster

Do you let your employees bring their own devices in for use on your company network or Wi-Fi connection? If so, we’re sure that they love the freedom that you provide for them, but we must warn you of the dangers that this can bring to an otherwise careful business. We’ll discuss some of the benefits, as well as the pitfalls, of allowing your employees to use personal devices in the workplace.

Continue reading
0 Comments

How to Handle an Employee that Wants to Use their Smartphone at Work

b2ap3_thumbnail_bring_your_own_device_400.jpgRecently, we’ve been approached by clients asking us about an employee wanting to set up their company email on their iPhone. The business owner thought, “Hey, that’s great! They’re getting more work done and I don’t need to pay for the phone or the service.” We then brought up a crucial point: “What happens when your employee leaves the company or loses their smartphone?”

Continue reading
0 Comments

BYOD Privacy: When Two Phones are Better Than One

b2ap3_thumbnail_bring_your_own_device_400.jpgBring Your Own Device (BYOD) has been a hot IT trend for the past few years. Initially, everybody loved the idea of workers using their personal smartphone for work and organizations were quick to adopt BYOD. Now, after years of trying out the policy, companies and employees are having reservations about BYOD, making some even long for the days of Blackberry.

Continue reading
0 Comments

Old Devices Can Compromise Security

b2ap3_thumbnail_device_security_400.jpgAs a responsible business owner, you know that using the latest technology and running updated software is a key component to your company's network security. However, your employees may not value the latest tech like you do, which could result in a major data breach, despite your best efforts to keep your company current.

Recent comment in this post
BOGNA Cook
I tried out the new edu birdie and i have to say the way that it was promoted it didnt much offer that in return it was quiet a di... Read More
Thursday, 12 July 2018 16:14
Continue reading
1 Comment

Old Mobile Devices Might Be Hurting Your Business’s Security

b2ap3_thumbnail_old_tech_security_risk_400.jpgOne of the greatest things about today's technology is that it has grown more mobile, and some employees like to bring their own devices from home to use for their workplace. This is called BYOD, and while it is useful sometimes, it might be putting your business at risk.

Continue reading
0 Comments

Is Your Business Ready for the Security Challenges of Wearable Tech?

b2ap3_thumbnail_wearable_security_400.jpgDue to the growing popularity of employees using their personal devices in the workplace (BYOD), many companies have created BYOD policies to handle the unique security threats brought about by these devices. Does the new trend of wearable technology mean that you need a separate WYOD policy?

Continue reading
0 Comments

2 of the Biggest Risks Associated with BYOD

b2ap3_thumbnail_bring_your_own_device_policy_400.jpgOne of the most popular business technology trends that we're seeing is employees bringing their own devices into the workplace (BYOD). This trend is due to the popularity of mobile devices (owned by over half of all U.S. adults). While this trend benefits companies in many ways like enhancing mobility, implementing BYOD for a business is not without risks.

Continue reading
0 Comments

5 BYOD Risks for Your Business

b2ap3_thumbnail_bringit400.jpgIn our last blog article, we introduced the IT trend of employees bringing in their personal devices to work (BYOD). We looked at 5 ways BYOD can help your business, but BYOD is not without risks. In part 2, we will cover five risks BYOD brings to your company's network and what you can to do manage them.

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

SecurityTip of the WeekTechnologyBest PracticesPrivacyCloudInternetMicrosoftBusiness ComputingSoftwareHackersEfficiencyBusiness ManagementGoogleInnovationProductivityHosted SolutionsBackupUser TipsWorkplace TipsManaged Service ProviderProductivityMalwareMobile DevicesBusinessNetwork SecurityIT ServicesHardwareUpgradeComputerwindowsCommunicationEmailDataGadgetsSmartphonesIT SupportMiscellaneousSaving MoneyVirtualizationAppsWindows 10SmartphoneDisaster RecoveryBusiness ContinuitySmall BusinessNetworkMobile Device ManagementServerBrowserVoIPHealthMicrosoft OfficeInformation TechnologyTech TermAndroidSocial MediaMobile ComputingQuick TipsPasswordsOffice 365CybersecurityMobile OfficeData BackupGoing GreenData RecoveryHolidayOperating SystemWindows 10Save MoneycommunicationsOfficeChromeBYODOutsourced ITCybercrimeApplicationInternet of ThingsAppEmployer-Employee RelationshipUsersAlertBest PracticespamCollaborationData SecurityMarketingSearchLaw EnforcementRansomwareManaged IT ServicesIT SupportRemote ComputingTabletPhishingWearable TechnologyThe Internet of ThingsWirelessFacebookAppleVendor ManagementWiFiBring Your Own DeviceiPhoneHackingRisk ManagementCost ManagementMobilityMaintenanceRouterSaving TimeWireless TechnologyBDROneNoteHistoryUser ErrorRemote MonitoringMoneyAntivirusUnified Threat ManagementAutomationAvoiding DowntimeOffice TipsPasswordHard DrivesData ManagementComputersIT SolutionsArtificial IntelligenceTech SupportBig DataSocialTelephone SystemsEncryptionGovernmentCustomer Relationship ManagementBandwidthCloud ComputingUpdateVPNHumorWebsiteNet NeutralityGoogle DriveInformationEducationShortcutPrinterSocial NetworkingOutlookNetworkingGmailUSBPowerPointAnalyticsManaged IT ServicesProactive ITBudgetFirewallPhone SystemUnsupported SoftwareLithium-ion batteryCurrent EventsWi-FiTwo-factor AuthenticationVulnerabilityBlockchainExcelTelevisionIT COnsultantWordRetailMeetingsPaperless OfficeTelephonyComputer RepairTravelManaged ITManaged ServiceBatterySocial EngineeringPersonal InformationVirusInstant MessagingadministrationIdentity TheftEntertainmentStreaming MediaTrendingDisasterAuditRecoveryWork/Life BalanceApplicationsIntranetLaptopAugmented RealityMobile DeviceContent FilteringPoliticsStoragePrinter ServerWindows 7ScamTwitterProgrammingData StoragePrintingDisplayHosted SolutionData ProtectionBusiness IntelligenceAmazonGoogle AssistantConferencingWannaCryCustomer ServiceIT ManagementOneDriveBiometricsTouchscreenFax ServerSamsungPrivate CloudYoutubeDevicesVirtual RealityComputingHIPAAInternet ExlporerPatch ManagementHuman ResourcesData LossAutomobileCleaningUninterrupted Power SupplyDDoSSalesHard DriveEmailsFraudGoogle DocsSave TimeComputer CareBusiness TechnologySportsBenefitseWastehackerWireless ChargingComputer AccessoriesOnline CurrencyAccess ControlMobile SecurityFile SharingSaaSData BreachValueLegalWindows 8Project ManagementTransportationCortanaHybrid CloudHaaSEnd of SupportEvernoteCommerceFlexibilityManaging StressPoint of SaleBloggingVirtual AssistantTutorialAdvertisingWorkersjunkTabletsCamerasScalabilityPayrollLifestyleChromebookVoice over Internet ProtocolSharePointData storageComparisonUseriOSExperienceAlexa for BusinessPDFUpdatesHBOfilterNFLPresentationUpgradesCo-Managed ServicesHow ToIdentitiesSecurity CamerasVirtual DesktopSabotageTeamworkSpecificationsBest AvailableComputer FanCo-managed ITMusicScreen MirroringEmployer Employee RelationshipText MessagingMicrosoft WordScienceConsultantTelephoneLanguageMachine LearningBooksPCTouchpadCastSoftware as a ServicePrint ServerDevice SecurityWindows InkHyperlinkBlack MarketNokiaDowntimeBuisnessElectronic Medical RecordsGift GivingComputer ForensicsSmartwatchRunning CableGiftsMonitorsEbayWIndows Server 2008Google MapsNear Field CommunicationWebinarWasting TimeProactiveE-CommerceSafetyManagementServer MaintenanceOperating SysytemMicrobloggingCredit CardsNanotechnologyTrainingVendorSpywarePayment CardsIT consultingIT solutionsAccessoryWebsitesWireless InternetInvestmentFAQRoot Cause AnalysisCompany CultureEmployee-Employer RelationshipSyncData TheftEmployeeReliable Computing3D PrintingWindows 10sPeripheralGamificationROISurge ProtectorDistributed Denial of ServiceReputationWebinarChargerImagesComplianceEdgeBloatwareApp storeBreak/FixAdministratorMicrosoft ExcelSolid State DriveWorker CommuteKeyboardMemoryWindows Server 2008 R2Inbound MarketingSettingsAdobeTestingFilesVideo GamesCiminalMedical ITBrandingAccessHard Disk DriveHiring/FiringFinancialDevelopmentDebateMouseHelp DeskCameraChromecastAdminIdentity5GWIndows 7CommunitySmart TechnologyMicrsosoftNetwork CongestionISPLicensingRegulationsIntrantetProjectsIT budgetKeyboard ShortcutsData PrivacyEmployeesBluetoothRobotLegislation