Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

7 Tips to Take Control of Your PII

7 Tips to Take Control of Your PII

It is remarkable how much trust people have in Internet-based companies. Not just that they will fulfill the expectations placed on them, but that people routinely provide extremely sensitive information to these companies without thinking for a second about what they do with it. We will take a look at data collection practices, what Internet companies want with that data, and how millions of people every year become victims because they entrust their PII (Personally Identifiable Information) to corporations that promptly lose it.

Continue reading
0 Comments

This Scammer Raid Proves Just How Useful Monitoring Can Be

This Scammer Raid Proves Just How Useful Monitoring Can Be

It can be easy to underestimate the importance of monitoring your solutions, to adopt an “out of sight, out of mind” mentality. However, the benefits of persistent monitoring were recently thrust into the spotlight, when 24 spammers were arrested in October by the Delhi Police’s cyber cell for impersonating Microsoft support staff and duping American citizens.

Continue reading
0 Comments

Why Smart Cities May Not Be a Smart Idea Just Yet

Why Smart Cities May Not Be a Smart Idea Just Yet

As of this point, the vast majority of our experience with the Internet of Things has been on a small scale - accessories and appliances that connect to the Internet to gain some added functionality. This technology can also be applied to a larger, more civic purpose - the development of something called a “smart city.” Unfortunately, this application could prove to be as problematic as the IoT we are more accustomed to.

Continue reading
0 Comments

In Business, What’s the Differences Between Intelligence and Analysis?

In Business, What’s the Differences Between Intelligence and Analysis?

There’s a big difference between running a smart business and making smart business decisions, although one could say that one contributes to the other. More businesses than ever before are looking to their data to create better opportunities and make smarter decisions. We’ll take a dive into what the differences are between business intelligence and business analysis, as well as how they can contribute to your organization's success.

Recent comment in this post
Oren Cain
In the field of the business there are only two ways we can use for the profits one is the analysis and the other one is the reall... Read More
Friday, 08 February 2019 07:11
Continue reading
1 Comment

How the CLOUD Act Will Affect Your Security

How the CLOUD Act Will Affect Your Security

On March 23rd, 2018, the United States Congress passed another spending bill that could potentially limit individual privacy protection all over the world. This bill included a provision called the Clarifying Lawful Overseas Use of Data (or CLOUD) Act, which makes changes to the Stored Communications Act of 1986 and provides unelected American officials a considerable amount of power over digital privacy rights.

Continue reading
0 Comments

The Equifax Saga Continues as More Victims are Discovered

The Equifax Saga Continues as More Victims are Discovered

As though the initial news of Equifax’s 2017 data exposure wasn’t bad enough, it has been discovered that there are even more victims than previously thought. While news like this is never good, it can bring a silver lining if the opportunities that such news presents are seized.

Continue reading
0 Comments

Not so Fast! Why Your Deleted Files May Still Be on Your Hard Drive

Not so Fast! Why Your Deleted Files May Still Be on Your Hard Drive

March 31st is World Backup Day! Just as important as having a plan in place to backup your data is having a way to recover your files. Do you have a way to restore files that get lost, corrupted, or accidentally deleted? To highlight this need, we want to explain how a deleted file can actually be recovered.

Continue reading
0 Comments

2 Useful Mobile Apps for Every Modern Office Worker

b2ap3_thumbnail_crucial_business_app_400.jpgThe modern office only resembles the office of the past. Sure there are still desks and chairs and cork boards hanging on the walls. There are still printers, copiers, and maybe even a fax machine (although many times nowadays all of those tasks are handled by the same machine). The differences, though often understated, are prevalent; with advancements in technology being the most noteworthy change. The most evident of which, is the widespread use of employee-owned mobile devices.

Continue reading
0 Comments

Fact: USPS Makes $8 Million Per Year Selling Your Personal Data

b2ap3_thumbnail_data_mining_ups_400.jpgUnless you have been vigilant about covering your digital tracks, you’ve likely got your personal information floating all over cyberspace and it’s being used for who knows what. Most of this personal data is used for marketing purposes, but hackers like to get in on the data-collecting action too. Being aware of how your personal data is collected is the first step towards getting a handle on it.

Continue reading
0 Comments

There’s an Important Difference Between Data and Information

b2ap3_thumbnail_information_data_400.jpgYou can’t have IT without information, you can’t have information without data, and technology is what creates data so that you can better use your company’s technology to increase sales. Got it? Understanding the flow of data can be confusing. It’s important to have a handle on it so you can leverage your data for the success of your business.

Continue reading
0 Comments

3 Qualities to Look For in Your Data Backup Solution

b2ap3_thumbnail_data_redundancy_400.jpgYour business’s data is one of the most important assets your company has, and with the bat of an eyelash, it could all be gone. Imagine an unexpected hardware failure causing your business downtime and severe data loss. All businesses should be aware of the importance of data backup and recovery, especially if they utilize personal or sensitive information.

Continue reading
0 Comments

Your Business Needs a Data Destruction Plan to Minimize Liability

b2ap3_thumbnail_destruction_of_company_data_400.jpgConventional wisdom informs businesses to store every byte of their data possible, and with the affordability of cloud storage, more companies are storing more files. Surprisingly, in an aboutface to this maximum data-storage practice, businesses are now being advised to delete all unnecessary data in light of our lawsuit-happy culture.

Continue reading
0 Comments

Your Logs Hold the Secrets to Increase Network Performance and Security

b2ap3_thumbnail_keep_logs_around_400.jpgUsers log on and off your company's network all day long. You may think, "No big deal. It's part of the process." But data extrapolated from user logs is a big deal. It can provide your business with valuable information about network security and give you insight on how to improve operations.

Continue reading
0 Comments

Tomorrow Never Downloads: Protecting Your Database from Corporate and International Espionage

b2ap3_thumbnail_security_from_espionage_400.jpgFirewalls are the first thing companies think of when it comes to data security. What is the last security risk on an organization's mind? Your most tech-savvy employee. If someone were to "get to" the employee overseeing your network, they would be able to do some serious damage. What are you doing to protect your data from the employees you trust the most?

Continue reading
0 Comments

Enjoy the Party – Let the Hosts Do the Hard Work for You!

b2ap3_thumbnail_cloud_maintenance_400.jpgHosting the party isn't for everyone; it's a matter of space, cost, and responsibility. You could be the life of the party, but nobody would know because you're so busy making sure that everything is set and ready to rumble. Wouldn't it be easier if you could just hire someone to take care of all the little details for you, so you could enjoy the fruits of your labor?

Continue reading
0 Comments

Adding a Computer Network to Your Startup Business

b2ap3_thumbnail_computer_network400.jpgOne of the most significant signs that a small startup company is on its way to becoming a mid-sized business is when operations require more than one workstation. Whenever the founder of a company starts their business on their own, they will often do so using their personal computer. As the business grows, a computer network will be needed.

Continue reading
0 Comments

Consumer Data Collection is Growing

b2ap3_thumbnail_getit400.jpgWith the holiday shopping season winding down, it's the busiest time of the year for data collecting companies that compile information on the purchases you make. Are you aware of the extent that your purchases are being tracked? Knowing about data collection may make you want to buy all of your presents with cash.

Continue reading
0 Comments

Warning: CryptoLocker Virus will Delete Your Data!

b2ap3_thumbnail_crilock400.jpgThe CryptoLocker virus is a new ransomware that began attacking computers via the Internet last September and has now grown to become one of the world's fastest spreading and most dangerous malwares. If your business isn't prepared for CryptoLocker, then your company's data is at serious risk.

Continue reading
0 Comments

Today’s Network Security is about Controlling Information

b2ap3_thumbnail_netseccloud400.jpgThe modern IT landscape is dramatically changing from a model where an IT department controls everything, to companies outsourcing their IT services. This paradigm shift challenges older ideas about traditional network security equating ownership and control with strong security. Does your business view IT outsourcing as a security help or a hindrance?

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

SecurityTip of the WeekTechnologyBest PracticesPrivacyCloudInternetMicrosoftSoftwareBusiness ComputingGoogleBusiness ManagementHackersEfficiencyProductivityHosted SolutionsBackupUser TipsInnovationManaged Service ProviderWorkplace TipsMalwareBusinessIT ServicesMobile DevicesComputerHardwarewindowsNetwork SecurityUpgradeIT SupportMiscellaneousSaving MoneyEmailCommunicationProductivityVirtualizationDataSmartphonesGadgetsWindows 10AppsDisaster RecoveryBusiness ContinuitySmartphoneServerBrowserVoIPMobile Device ManagementSmall BusinessNetworkMicrosoft OfficeTech TermSocial MediaMobile ComputingInformation TechnologyHealthAndroidQuick TipsPasswordsCybersecurityHolidayOperating SystemData BackupMobile OfficeGoing GreenSave MoneyWindows 10Office 365ChromespamData RecoveryCybercrimeOutsourced ITcommunicationsAppApplicationOfficeAlertBest PracticeCollaborationMarketingManaged IT ServicesSearchUsersInternet of ThingsRansomwareEmployer-Employee RelationshipData SecurityBYODLaw EnforcementTabletRemote ComputingWearable TechnologyThe Internet of ThingsAppleFacebookVendor ManagementWiFiBring Your Own DeviceiPhoneRisk ManagementCost ManagementIT SupportMoneyHackingMaintenanceSaving TimeRouterPhishingWireless TechnologyBDRHistoryUser ErrorRemote MonitoringMobilityAntivirusUnified Threat ManagementAvoiding DowntimeHard DrivesOffice TipsPasswordIT SolutionsCloud ComputingTech SupportBig DataData ManagementComputersEncryptionSocialTelephone SystemsCustomer Relationship ManagementOneNoteGovernmentBandwidthAutomationWirelessVPNHumorTwo-factor AuthenticationInformationWebsiteUpdateNet NeutralityUnsupported SoftwarePrinterSocial NetworkingWi-FiShortcutOutlookVulnerabilityGmailUSBPowerPointNetworkingAnalyticsGoogle DriveProactive ITFirewallArtificial IntelligenceBudgetLithium-ion batteryCurrent EventsPhone SystemIdentity TheftManaged IT ServicesIT COnsultantEducationTelevisionWork/Life BalanceRetailExcelComputer RepairMobile DeviceMeetingsPoliticsTravelVirusadministrationSocial EngineeringStreaming MediaDisasterTrendingApplicationsAuditManaged ITEntertainmentIntranetRecoveryLaptopBlockchainAugmented RealityPersonal InformationContent FilteringPrinter ServerHaaSSave TimeData ProtectionProgrammingManaging StressTwitterComputer CareWordStorageGoogle AssistantConferencingIT ManagementhackerDisplayAmazonManaged ServicePaperless OfficeDevicesLegalHosted SolutionTransportationFax ServerCommercePatch ManagementEnd of SupportBusiness IntelligenceFlexibilityTelephonyCustomer ServiceComputingFraudBiometricsUninterrupted Power SupplySalesGoogle DocsHard DrivePrivate CloudVirtual RealityBusiness TechnologyData StorageScamHIPAAWireless ChargingInternet ExlporerAccess ControlHuman ResourcesDDoSMobile SecurityWannaCryData BreachInstant MessagingEmailsProject ManagementOnline CurrencyTouchscreenCortanaWindows 8EvernoteSportsHybrid CloudSamsungBenefitseWasteBatteryComputer AccessoriesSaaSAutomobileValueCleaningPoint of SaleWIndows 7Co-Managed ServicesLifestyleBloggingIdentitiesSecurity CamerasTutorialCompany CultureNFLNetwork CongestionPrintingWindows 10sSpecificationsMicrosoft WordReputationRegulationsTelephoneLanguageMachine LearningBluetoothWorker CommuteAdministratorjunkSolid State DriveCo-managed ITSettingsDevice SecurityKeyboardCamerasSoftware as a ServiceUserHyperlinkDowntimeWindows InkSharePointVideo GamesAccessfilterComputer ForensicsHard Disk DriveGiftsNokiaHiring/FiringWIndows Server 2008Virtual DesktopPresentationOneDriveBest AvailableWasting TimeGift GivingProactiveE-CommercePrint ServerGoogle MapsTeamworkCredit CardsScienceManagementYoutubeVendorSpywareSmart TechnologyAccessoryEbayWebsitesPayment CardsMicrobloggingData LossFAQRobotWireless InternetEmployee-Employer RelationshipSyncBuisnessAdvertisingScalabilityPeripheralData TheftEmployeeRunning CableiOSChargerExperienceData storageGamificationEdgePDFNear Field CommunicationHow ToApp storeBreak/FixWebinarUpgradesMicrosoft ExcelImagesComputer FanMusic3D PrintingMemoryIT consultingTestingScreen MirroringCiminalSurge ProtectorEmployer Employee RelationshipAdobeText MessagingMedical ITConsultantFile SharingBooksTouchpadFinancialReliable ComputingCameraCastAdminHelp DeskDistributed Denial of ServiceBlack MarketComplianceIdentityDebateMonitorsElectronic Medical RecordsBloatwareProjectsIT budgetKeyboard ShortcutsLicensingInbound MarketingData PrivacyWebinarLegislationCommunityNanotechnologyWorkersFilesSafetyOperating SysytemVirtual AssistantISPWindows 7PayrollTrainingTabletsBrandingIntrantetMouseChromebookIT solutionsComparisonRoot Cause AnalysisUpdatesChromecastHBOAlexa for Business