Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Could You Spot a Social Engineering Attack?

Could You Spot a Social Engineering Attack?

As invaluable as the security solutions that protect a network are, they can be effectively rendered useless if a cybercriminal is skilled in social engineering. Social engineering is the practice of using manipulation to access protected resources, as we will review later. If your business and its team are vulnerable to a social engineering attempt, you are missing a critical piece of your data security strategy.

Continue reading
0 Comments

Three Cybercrimes Have Ended in Guilty Pleas

Three Cybercrimes Have Ended in Guilty Pleas

When so much of what we write is about the threats and attacks that exist (and are carried out) in cyberspace, it is particularly refreshing when we can discuss those responsible for these attacks in the context of their legal proceedings. For example, today we are able to discuss how actors in some of the biggest recent cybersecurity events have entered guilty pleas.

Continue reading
0 Comments

Cybersecurity Can't Stop During the Holidays

Cybersecurity Can't Stop During the Holidays

This Christmas, technology is everywhere. Traditionally, the holidays were a time when things slowed down for businesses and people spent time with their families and put their work on the back burner. Those days are over. Today’s professional is lucky to get a day off for Christmas; and, because of the way business works today, may be asked to do more than ever around the holidays.

Continue reading
0 Comments

Major Cyber Threats Are Less Of A Worry With An MSP’s Help

Major Cyber Threats Are Less Of A Worry With An MSP’s Help

There are dozens of surveys and reports produced each year that evaluate digital threats and cybercrime. Not every publication applies to every business - but many of them do have some important take aways about the best practices of handling IT. Here’s few highlights from the 2017 Cyberthreat Defense Report that offer important insight for SMBs and their use of technology.

Continue reading
0 Comments

The Federal Bureau of Investigation Has Some Valuable Cybersecurity Tips

The Federal Bureau of Investigation Has Some Valuable Cybersecurity Tips

In February of 2016, President Barack Obama passed a Cybersecurity National Action Plan. The plan implemented near-term actions and developed a long-term strategy to enhance cybersecurity awareness and protections, protect privacy, and maintain public safety. Taking action against cybersecurity now will assist with ensuring economic and national security, as well as empowering Americans to take better control of their digital security.

Recent comment in this post
Octavius Craig
Federal bureau of the investigation is making good names for the arrest of the culprits. All the issues of the https://ukessaysrev... Read More
Monday, 13 August 2018 07:08
Continue reading
1 Comment

Hackers Beware: IBM Unleashes Supercomputer Watson to Tackle Cybercrime

Hackers Beware: IBM Unleashes Supercomputer Watson to Tackle Cybercrime

Sherlock Holmes is one of the most famous detectives in fiction, but without his dear Dr. Watson, he would have been stumped on occasion. There’s a good reason why IBM named its super-intelligent computer, Watson, after the famous character. True to its namesake, Watson is now being used to safeguard 40 organizations from cyber security threats.

Continue reading
0 Comments

NATO Officially Declares Cyberspace a Battlefield

NATO Officially Declares Cyberspace a Battlefield

Security professionals have been at war with hackers ever since the Internet was created, but a recent NATO decision has affirmed the fact that cybersecurity is a real-world problem, and one that needs to be fixed. Just like land, air, and sea, cyberspace has become a battlefield, albeit a very different kind of battlefield.

Continue reading
0 Comments

How and Why Cyber Crime is so Effective

b2ap3_thumbnail_cyber_crime_is_the_new_norm_400.jpgThe Internet is a fantastic tool that has ushered in an era of productivity and connectivity that we could only previously have dreamed of. Unfortunately, like every great tool, it can be used for darker, malicious purposes. In the Internet’s case, it’s used for anonymous illegal activity, like drug trafficking or selling data on the black market.

Continue reading
0 Comments

The Underworld of Cybercrime, the Darknet

b2ap3_thumbnail_keypad_darknet_400.jpgHave you ever wondered how hackers become hackers in the first place? How are tools readily available to them? Business owners might be reluctant to find out that hacking has become easier than ever over the past decade. This is partly due to the increased sophistication of the black market known to some as the Darknet.

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

SecurityTip of the WeekTechnologyBest PracticesPrivacyInternetCloudMicrosoftBusiness ComputingHackersSoftwareGoogleEfficiencyBusiness ManagementInnovationHosted SolutionsProductivityBackupWorkplace TipsUser TipsManaged Service ProviderMalwareBusinessMobile DevicesNetwork SecurityIT ServicesHardwarewindowsProductivityUpgradeComputerEmailDataCommunicationGadgetsSmartphonesIT SupportMiscellaneousSaving MoneyVirtualizationWindows 10SmartphoneAppsSmall BusinessNetworkDisaster RecoveryBusiness ContinuityBrowserVoIPServerMobile Device ManagementMicrosoft OfficeHealthTech TermAndroidMobile ComputingSocial MediaInformation TechnologyQuick TipsPasswordsCybersecurityWindows 10Mobile OfficeOffice 365Data BackupGoing GreenHolidayOperating SystemData RecoverycommunicationsOfficeChromeSave MoneyCybercrimeAppOutsourced ITAlertBest PracticeUsersApplicationInternet of ThingsEmployer-Employee RelationshipCollaborationBYODspamRansomwareMarketingLaw EnforcementManaged IT ServicesData SecuritySearchIT SupportThe Internet of ThingsPhishingFacebookAppleVendor ManagementWiFiBring Your Own DeviceRemote ComputingWirelessTabletWearable TechnologySaving TimeBDRUser ErrorHistoryRemote MonitoringUnified Threat ManagementAntivirusAvoiding DowntimeMobilityAutomationiPhoneRisk ManagementCost ManagementMoneyRouterHackingMaintenanceWireless TechnologyData ManagementComputersOneNoteGovernmentSocialTelephone SystemsCustomer Relationship ManagementBandwidthArtificial IntelligenceHard DrivesIT SolutionsOffice TipsTech SupportPasswordBig DataCloud ComputingEncryptionWi-FiInformationPowerPointAnalyticsVulnerabilityProactive ITNetworkingFirewallGoogle DriveLithium-ion batteryCurrent EventsBudgetPhone SystemVPNHumorWebsiteNet NeutralityEducationTwo-factor AuthenticationUpdateManaged IT ServicesPrinterOutlookUnsupported SoftwareSocial NetworkingGmailUSBShortcutMeetingsWordTelephonyTravelMobile DeviceVirusPoliticsStreaming MediaadministrationSocial EngineeringManaged ServiceTrendingAuditDisasterIntranetAugmented RealityLaptopEntertainmentContent FilteringManaged ITRecoveryBatteryPersonal InformationApplicationsTelevisionIdentity TheftRetailIT COnsultantPaperless OfficeBlockchainExcelComputer RepairWork/Life BalanceData ProtectionTransportationEnd of SupportCommerceCustomer ServiceBiometricsFlexibilityGoogle AssistantConferencingIT ManagementUninterrupted Power SupplySalesHard DrivePrivate CloudVirtual RealityHIPAADevicesInternet ExlporerData StorageScamOnline CurrencyHuman ResourcesPatch ManagementDDoSInstant MessagingEmailsWannaCryFraudGoogle DocsSportsWindows 8TouchscreenBenefitseWastePoint of SaleComputer AccessoriesBusiness TechnologyPrinter ServerSamsungWireless ChargingSaaSValueAccess ControlTwitterMobile SecurityFile SharingProgrammingAutomobileData BreachProject ManagementHaaSCleaningCortanaDisplayAmazonManaging StressHybrid CloudEvernoteStorageSave TimeComputer CareOneDrivehackerFax ServerComputingHosted SolutionYoutubeBusiness IntelligenceLegalPrintingMicrobloggingMicrosoft WordLanguageMachine LearningSmart TechnologyTelephonePCBuisnessRunning Cable3D PrintingSoftware as a ServiceRobotDevice SecuritySurge ProtectorAdvertisingDowntimeWindows InkHyperlinkNear Field CommunicationScalabilityComputer ForensicsSmartwatchGiftsWIndows Server 2008iOSWebinarExperienceImagesData storagePDFProactiveE-CommerceGoogle MapsWasting TimeUpgradesIT consultingHow ToManagementServer MaintenanceCredit CardsComputer FanMusicVendorSpywareText MessagingWebsitesPayment CardsData LossScreen MirroringEmployer Employee RelationshipAccessoryConsultantReliable ComputingWireless InternetInvestmentFAQSyncDistributed Denial of ServiceDebateCommunityBooksComplianceHelp DeskEmployee-Employer RelationshipTouchpadData TheftEmployeeISPCastBloatwarePeripheralBlack MarketGamificationROIChargerIntrantetMonitorsElectronic Medical RecordsInbound MarketingEdgeTutorialApp storeBreak/FixMicrosoft ExcelFilesBloggingWebinarMemoryBrandingAdobeNanotechnologyMouseSafetyTestingOperating SysytemCiminalMedical ITChromecastTrainingLifestyleIT solutionsWIndows 7FinancialAdminRoot Cause AnalysisNetwork CongestionCo-managed ITCameraRegulationsIdentity5GCompany CultureBluetoothWindows 10sIT budgetKeyboard ShortcutsLicensingjunkProjectsReputationCamerasPrint ServerData PrivacyEmployeesLegislationSharePointSolid State DriveUserWorker CommuteVirtual AssistantAdministratorWorkersPayrollTabletsSettingsKeyboardfilterWindows 7PresentationVideo GamesChromebookVoice over Internet ProtocolComparisonVirtual DesktopNokiaEbayHBOTeamworkGift GivingHard Disk DriveBest AvailableAlexa for BusinessAccessUpdatesIdentitiesSecurity CamerasNFLScienceHiring/FiringCo-Managed ServicesSabotageSpecifications