Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

7 Tips to Take Control of Your PII

7 Tips to Take Control of Your PII

It is remarkable how much trust people have in Internet-based companies. Not just that they will fulfill the expectations placed on them, but that people routinely provide extremely sensitive information to these companies without thinking for a second about what they do with it. We will take a look at data collection practices, what Internet companies want with that data, and how millions of people every year become victims because they entrust their PII (Personally Identifiable Information) to corporations that promptly lose it.

Continue reading
0 Comments

3 Backup Nightmares You Don’t Want to Happen to You

3 Backup Nightmares You Don’t Want to Happen to You

Your business needs to have data backup and disaster recovery, period. There is no exception to this rule. The hard truth of the matter is that your business is risking far too much by not implementing data backup and disaster recovery. Today, we’ll examine scenarios in which a business might find its data threatened, as well as how modern businesses can keep their data safe, even when the world seems out to get them.

Continue reading
0 Comments

The Equifax Saga Continues as More Victims are Discovered

The Equifax Saga Continues as More Victims are Discovered

As though the initial news of Equifax’s 2017 data exposure wasn’t bad enough, it has been discovered that there are even more victims than previously thought. While news like this is never good, it can bring a silver lining if the opportunities that such news presents are seized.

Continue reading
0 Comments

Can You Trust Your Mobile Apps?

Can You Trust Your Mobile Apps?

You can never know whether or not that app you just downloaded to your smartphone can expose your data or identity to risk. While Google Play and the iTunes store certainly put efforts into ensuring that users can safely browse their app stores, it’s unlikely that they can find every single malicious app out there before it infects someone’s device. Therefore, you need to consider the following measures to ensure that you don’t put your business at risk by downloading unsecure apps.

Continue reading
0 Comments

Could You Spot a Social Engineering Attack?

Could You Spot a Social Engineering Attack?

As invaluable as the security solutions that protect a network are, they can be effectively rendered useless if a cybercriminal is skilled in social engineering. Social engineering is the practice of using manipulation to access protected resources, as we will review later. If your business and its team are vulnerable to a social engineering attempt, you are missing a critical piece of your data security strategy.

Continue reading
0 Comments

Why A Network Audit Is A Good Idea

Why A Network Audit Is A Good Idea

Most small businesses don’t have the luxury of an in-house IT department. Even if they do have one, it’s likely a small department run by a handful of folks who have their hands full with either implementation projects or simply staying afloat. With opportunities to invest in the improvement of your infrastructure few and far between, a network audit can help you identify where your network suffers most, and what you can do about it.

Continue reading
0 Comments

Why You Should Pay Attention to Data Security Notifications

Why You Should Pay Attention to Data Security Notifications

If you’ve watched the news lately, chances are you’ve seen the Equifax breach and the ridiculous fallout it has caused. Over 133 million personal records have been stolen. While it’s difficult not to feel individually victimized by such a breach, it’s important to remember that it’s often not your specific credentials targeted by hackers. Since businesses often hold onto valuable information, they have big crosshairs painted onto them. It doesn’t even stop there--any vendors or partners you deal with are also in danger of hacking attacks.

Continue reading
0 Comments

While Dragons Might Not Stand Guard, HBO Is Serious About Data Security

While Dragons Might Not Stand Guard, HBO Is Serious About Data Security

With the mountainous success of Game of Thrones, the BBC-produced show has always been understandably concerned with their security. However, with the show officially overtaking the original source material, A Song of Ice and Fire, there is an increased presence of curious fans and members of the press with an eye out for a sneak peek at the action. This has led to more; somewhat more modern measures being adopted to keep the production’s secrets safe.

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

SecurityTip of the WeekTechnologyBest PracticesPrivacyCloudInternetMicrosoftSoftwareBusiness ComputingGoogleBusiness ManagementHackersEfficiencyProductivityHosted SolutionsBackupUser TipsInnovationManaged Service ProviderWorkplace TipsMalwareBusinessIT ServicesMobile DevicesComputerHardwarewindowsNetwork SecurityUpgradeCommunicationIT SupportMiscellaneousSaving MoneyEmailProductivityDataVirtualizationSmartphonesWindows 10GadgetsSmartphoneAppsDisaster RecoveryBusiness ContinuityServerBrowserVoIPMobile Device ManagementSmall BusinessNetworkMicrosoft OfficeInformation TechnologyTech TermSocial MediaMobile ComputingHealthQuick TipsAndroidPasswordsCybersecurityGoing GreenHolidayData BackupOperating SystemMobile OfficeSave MoneyWindows 10ChromeOffice 365CollaborationspamAppData RecoveryCybercrimeOutsourced ITAlertBest PracticecommunicationsOfficeApplicationInternet of ThingsRansomwareMarketingEmployer-Employee RelationshipSearchLaw EnforcementManaged IT ServicesUsersData SecurityBYODRemote ComputingTabletWearable TechnologyThe Internet of ThingsAppleFacebookVendor ManagementWiFiBring Your Own DeviceAvoiding DowntimeiPhoneMobilityRisk ManagementCost ManagementMaintenanceSaving TimeRouterWireless TechnologyBDRMoneyIT SupportHackingHistoryUser ErrorPhishingRemote MonitoringUnified Threat ManagementAntivirusHard DrivesAutomationIT SolutionsTech SupportBig DataOffice TipsPasswordEncryptionCloud ComputingCustomer Relationship ManagementOneNoteGovernmentData ManagementComputersSocialBandwidthTelephone SystemsArtificial IntelligenceVPNHumorBudgetWebsiteNet NeutralityPhone SystemWirelessSocial NetworkingPrinterTwo-factor AuthenticationOutlookUpdateUnsupported SoftwareGmailUSBPowerPointAnalyticsWi-FiShortcutVulnerabilityProactive ITFirewallNetworkingLithium-ion batteryGoogle DriveCurrent EventsInformationContent FilteringManaged ITEntertainmentRecoveryIT COnsultantPersonal InformationTelevisionEducationComputer RepairRetailIdentity TheftManaged IT ServicesVirusWork/Life BalanceExcelApplicationsadministrationMobile DeviceMeetingsTravelStreaming MediaPoliticsDisasterBlockchainTrendingAuditSocial EngineeringIntranetLaptopAugmented RealityInstant MessagingGoogle AssistantEmailsConferencingWannaCryPoint of SaleIT ManagementTouchscreenPrinter ServerSportsSamsungBenefitsManaged ServiceDevicesTwitterProgrammingeWasteBatteryComputer AccessoriesPatch ManagementValueSaaSAutomobileDisplayAmazonCleaningPaperless OfficeFraudGoogle DocsHaaSSave TimeComputer CareBusiness TechnologyFax ServerManaging StressStorageComputinghackerWireless ChargingAccess ControlMobile SecuritySalesHard DriveUninterrupted Power SupplyData BreachLegalProject ManagementTransportationCortanaHosted SolutionEnd of SupportHybrid CloudBusiness IntelligenceEvernoteCommerceFlexibilityCustomer ServiceTelephonyBiometricsVirtual RealityPrivate CloudOnline CurrencyScamWindows 8Data StorageHIPAAInternet ExlporerHuman ResourcesData ProtectionWordDDoSTouchpadIntrantetBooksSoftware as a ServiceReliable ComputingDevice SecurityCastComplianceWindows InkDistributed Denial of ServiceBlack MarketHyperlinkLifestyleBloggingDowntimeTutorialBloatwareComputer ForensicsGiftsMonitorsElectronic Medical RecordsWIndows Server 2008Inbound MarketingGoogle MapsWebinarWasting TimeProactiveE-CommerceOperating SysytemManagementCredit CardsNanotechnologyFilesSafetyTrainingBrandingVendorCo-managed ITSpywareData LossIT solutionsAccessoryMouseWebsitesPayment CardsWireless InternetFAQRoot Cause AnalysisChromecastCompany CultureEmployee-Employer RelationshipNokiaWIndows 7SyncPrint ServerWindows 10sOneDrivePeripheralGift GivingNetwork CongestionData TheftEmployeeReputationGamificationYoutubeRegulationsChargerBluetoothEdgeBreak/FixMicrobloggingjunkMicrosoft ExcelSolid State DriveWorker CommuteEbayAdministratorApp storeMemoryCamerasSettingsKeyboardSharePointVideo GamesTestingUserCiminalAdobeMedical ITfilterFile SharingHard Disk DriveAccessHiring/FiringVirtual DesktopFinancialPresentationTeamworkCameraBest AvailableAdminIdentityWebinarImagesScienceSmart Technology3D PrintingLicensingProjectsIT budgetKeyboard ShortcutsSurge ProtectorRobotData PrivacyLegislationBuisnessAdvertisingVirtual AssistantWorkersTabletsRunning CableScalabilityWindows 7PayrollData storageChromebookDebateComparisonHelp DeskiOSExperiencePDFAlexa for BusinessNear Field CommunicationUpdatesHBONFLUpgradesHow ToCo-Managed ServicesIdentitiesSecurity CamerasPrintingSpecificationsComputer FanMusicEmployer Employee RelationshipText MessagingCommunityIT consultingMicrosoft WordScreen MirroringConsultantISPTelephoneLanguageMachine Learning