Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Poking at Spear Phishing

Poking at Spear Phishing

Hopefully, you’ve heard of phishing at this point: the method cybercriminals use to scam their targets by impersonating someone that their targets would trust, requesting access credentials or other sensitive information. Did you know that there are specific kinds of phishing? Here, we’ll review one of the biggest risks to your business... spear phishing.

Continue reading
0 Comments

How to Set Up a Gmail Auto-Response

How to Set Up a Gmail Auto-Response

These days, our society is infamously connected, especially in the business sense. This can make it jarring to not receive a reply back from an email. While we all need a break every now and then, we also need to get back to our contacts efficiently - this is where the ‘out of office’ message in Gmail comes in.

Continue reading
0 Comments

How the Grinch Didn’t Send that Email!

How the Grinch Didn’t Send that Email!

An email’s important,
That much is clear fact -
But you need to stay safe
From an email attack.

Continue reading
0 Comments

3 Ways Email Encryption Keeps Your Messages Safe

3 Ways Email Encryption Keeps Your Messages Safe

Encryption is a very important tool in today’s business environment, especially if you are trying to protect your email communications. Today, we’ll discuss the benefits of using encryption for your business’ communications solutions, but without an understanding of what encryption actually is, the conversation might be a little harder to understand.

Continue reading
0 Comments

Can You Recognize the Risks that Appear in Your Email?

Can You Recognize the Risks that Appear in Your Email?

Email is often touted as a favorite medium for launching cyberattacks against businesses and individuals. This is because it’s easy to hide the true intent behind an email attack within its contents, whether they are embedded images in the message itself, or links to external sources. How can you know for sure whether the links in your email inbox are legitimate?

Continue reading
0 Comments

Tip of the Week: Syncing Email Across Multiple Devices

Tip of the Week: Syncing Email Across Multiple Devices

It’s true that email is such a common solution that most people don’t think twice about how it works. However, it’s imperative that you at least understand the concept, as it can provide you with a considerable advantage when it comes time to optimize email access on your mobile devices. First, we’ll discuss the ways in which the two major message exchange protocols differ, and then dig into the specifics of why you should choose one over the other.

Continue reading
0 Comments

Tip of the Week: Need to Write an Email? Keep These 5 Steps in Mind

Tip of the Week: Need to Write an Email? Keep These 5 Steps in Mind

There are good emails, and there are bad emails. You know them when you see them, but can you write an email that’s more likely to be read and acted upon? There are a few key steps to writing them more effectively. For this week’s tip, we’ll walk you through five steps to improving your emails.

Continue reading
0 Comments

Is It A Good Idea To Bait A Phishing Scam?

Is It A Good Idea To Bait A Phishing Scam?

Phishing scams have had a supporting role in many of the latest cyber threats, often as the means the attacker has used to start off their attack. This attack vector is relatively easy to avoid in most cases, but requires education for the end user.

Continue reading
0 Comments

If Your Business Could Talk, It’d Complain About Spam

If Your Business Could Talk, It’d Complain About Spam

Chances are, you’ve heard of spam, but many don’t know how to identify it in the first place, let alone work around it. Frankly, spam can cause some serious damage to your business if not properly dealt with. In today’s blog, you’ll learn what makes spam, “spam,” and how you can keep it from infecting your inbox.

Continue reading
0 Comments

Tip of the Week: How to Craft an Irresistible Email Subject Line

Tip of the Week: How to Craft an Irresistible Email Subject Line

We think that it’s safe to say that nobody enjoys their inbox receiving incredulous amounts of emails on a regular basis. Yet, the business owner must maintain their inbox every day, and if a message doesn’t strike them as important, they’ll probably either ignore it or delete it completely. Here’s how you can prevent this from happening.

Continue reading
0 Comments

Gmail Now Notifies Users if an Email Comes From a Shady Source

b2ap3_thumbnail_gmail_security_400.jpgWhenever you receive an email, there’s the possibility that it’s a spam message sent to infect you with viruses or malware, or to just waste your time. This chance isn’t just negligible; in fact, it’s enough to warrant concern for anyone utilizing email as a communication medium, including business owners. Thankfully, users of Gmail will soon be having a much easier time knowing the origin of their messages, and whether or not they were sent over a secure connection.

Continue reading
0 Comments

Tip of the Week: Even the Most Careful People Fall For These 4 Email Mistakes

b2ap3_thumbnail_email_gaffes_400.jpgDespite the rapid advancements of business technology in the past decade, enterprises the world over are still heavily dependent upon email. Therefore, every modern worker needs to be trained on how to send a professional email. If not, classic email mistakes will be made that could bruise your company’s reputation, like these four common email blunders.

Recent comment in this post
Macey Moss
Sometimes many careful people fall in email mistakes and this may cause to lose their important data like office files. If you wan... Read More
Thursday, 13 December 2018 06:57
Continue reading
1 Comment

How a Spam Filtering Solution is Like the Sheriff of Your Network

b2ap3_thumbnail_ocular_patdown_400.jpgWhen it comes to the security of your company’s network, you need to have a strike plan to get you out of any potentially threatening situations. Essentially, your network needs an email security solution like a spam filter to act as a sheriff for your business.

Continue reading
0 Comments

Email May Be On Its Deathbed

b2ap3_thumbnail_email_not_popular_400.jpgEmail is such a staple of the modern office that it might seem like even the mention of a world without it is ludicrous. Others, however, feel like their inbox is keeping them from pushing toward bigger and better things. Email might hold a special spot in our hearts, but realistically, does it stand a chance in the future?

Continue reading
0 Comments

Are You on Constant Inbox-Watch?

b2ap3_thumbnail_email_spew_400.jpgAre your eyes constantly glued on your email inbox during the workday? It’s not bad to keep up with what’s going on in the office, but a recent study has linked constant email-checking to higher stress levels. This probably isn’t surprising to some, but some folks, like the researchers at the University of British Columbia, claim that there’s a maximum number of times to check your email throughout the day to minimize stress in the workplace.

Continue reading
0 Comments

Pluto Mail Makes it Possible to Unsend an Email

b2ap3_thumbnail_pluto_mail_flexibility_400.jpgFor those with weak stomachs, it’s not recommended to go back and read an email that was just sent. In doing so, a spelling or grammar error is likely to be found, which will cause one’s stomach to turn and fill with regret. If only there was a do-over button. Thanks to the new app called Pluto Mail, there is one.

Continue reading
0 Comments

Fundamentals of MXLogic

MXLogicWith the constant advancements of technology, there have been equal advancements in malicious code coming from emails. Utilizing MXLogic, Excedeo is able to provide enterprise-grade solutions for security and disaster recovery. In this article, different functions are discussed that are available to the current users of MXLogic under Excedeo.

Continue reading
0 Comments

5 Gmail and Outlook Tricks to Cut Corners On Your Email Time

b2ap3_thumbnail_email_tricks_400.jpgWe all know how annoying email can be at times. Your inbox is constantly being filled with new messages, and before you know it, you have no idea what you've responded to or what needs to be responded to. To make matters worse, the average office worker spends roughly two hours staring at their email inbox and responding to messages. Not only is this counterproductive, but is also a massive time-wasting practice.

Continue reading
0 Comments

How To Compress PDF Files

Most mail servers limit attachments to 10MB, which may be a problem for large PDF files that may have been generated from a bulk scan or creation. The following application and steps provide a quick and easy way to shrink these large files in size to allow transmittal through e-mail in most cases.

Tags:
Continue reading
0 Comments

How to Change Office 365 User Password

 

For users who are hosted with Microsoft Office 365 or a similar hosted provider, if you receive a prompt within your email application (i.e. Outlook) constantly asking for your password it may have expired on the Office 365 (or hosted provider) portal site. Utilize the following steps to change your password and remove the pop up message from your mail application:

 

Recent comment in this post
Tammy DMeacham
It is so good to know that how to change office 365 user password and I hope many people need this to solve their issues. I am sti... Read More
Tuesday, 18 September 2018 10:14
Continue reading
1 Comment

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

SecurityTip of the WeekTechnologyBest PracticesPrivacyInternetCloudMicrosoftBusiness ComputingSoftwareHackersEfficiencyBusiness ManagementGoogleInnovationProductivityHosted SolutionsBackupUser TipsWorkplace TipsManaged Service ProviderMalwareProductivityBusinessMobile DevicesNetwork SecurityHardwareIT ServicesUpgradewindowsComputerEmailDataGadgetsSmartphonesCommunicationIT SupportMiscellaneousSaving MoneyVirtualizationAppsWindows 10SmartphoneSmall BusinessNetworkDisaster RecoveryBusiness ContinuityServerBrowserMobile Device ManagementVoIPHealthMicrosoft OfficeTech TermMobile ComputingAndroidSocial MediaInformation TechnologyQuick TipsPasswordsData BackupMobile OfficeOffice 365CybersecurityWindows 10Data RecoveryHolidayGoing GreenOperating SystemcommunicationsOfficeSave MoneyChromeBYODAppCybercrimeAlertBest PracticeApplicationOutsourced ITCollaborationInternet of ThingsEmployer-Employee RelationshipUsersspamMarketingManaged IT ServicesSearchIT SupportRansomwareData SecurityLaw EnforcementWirelessThe Internet of ThingsTabletFacebookPhishingWearable TechnologyAppleVendor ManagementWiFiRemote ComputingBring Your Own DeviceiPhoneRouterWireless TechnologyBDRHackingOneNoteRisk ManagementCost ManagementMoneyUser ErrorRemote MonitoringMaintenanceSaving TimeAntivirusUnified Threat ManagementAvoiding DowntimeHistoryAutomationMobilityEncryptionPasswordHard DrivesGovernmentComputersData ManagementCloud ComputingSocialBandwidthTelephone SystemsCustomer Relationship ManagementArtificial IntelligenceIT SolutionsTech SupportBig DataOffice TipsGmailUSBManaged IT ServicesPowerPointAnalyticsInformationShortcutUnsupported SoftwareProactive ITFirewallSocial NetworkingWi-FiNetworkingLithium-ion batteryVulnerabilityCurrent EventsVPNGoogle DriveHumorBudgetWebsitePhone SystemNet NeutralityEducationPrinterTwo-factor AuthenticationOutlookUpdateExcelIdentity TheftIT COnsultantWordMeetingsStreaming MediaTravelComputer RepairWork/Life BalanceTelephonyTrendingAuditManaged ServiceSocial EngineeringMobile DevicePoliticsIntranetVirusLaptopAugmented RealityInstant MessagingContent FilteringadministrationEntertainmentRecoveryDisasterTelevisionApplicationsRetailManaged ITPaperless OfficeBatteryPersonal InformationBlockchainSave TimePrintingComputer CareData ProtectionHosted SolutionBusiness IntelligencehackerGoogle AssistantConferencingIT ManagementCustomer ServiceBiometricsLegalVirtual RealityYoutubeOnline CurrencyTransportationDevicesPrivate CloudCommerceEnd of SupportHIPAAFlexibilityPatch ManagementInternet ExlporerData LossHuman ResourcesSalesHard DriveDDoSUninterrupted Power SupplyEmailsFraudGoogle DocsData StorageScamPoint of SalePrinter ServerBusiness TechnologySportsBenefitsProgrammingTwitterWireless ChargingeWasteComputer AccessoriesWannaCryAccess ControlMobile SecurityFile SharingTouchscreenValueDisplayData BreachSaaSWindows 8AmazonProject ManagementCortanaSamsungOneDriveHybrid CloudEvernoteHaaSFax ServerManaging StressAutomobileStorageCleaningComputingWindows 7ChromebookVoice over Internet ProtocolComparisonSharePointUserLifestyleCompany CultureWindows 10sfilterAlexa for BusinessUpdatesHBOIdentitiesSecurity CamerasNFLVirtual DesktopPresentationCo-Managed ServicesReputationSabotageSpecificationsTeamworkBest AvailableScienceSolid State DriveWorker CommuteAdministratorMicrosoft WordLanguageMachine LearningSettingsKeyboard3D PrintingTelephoneVideo GamesPCSurge ProtectorHard Disk DriveSoftware as a ServiceAccessDevice SecurityDowntimeWindows InkBuisnessNokiaHiring/FiringHyperlinkComputer ForensicsSmartwatchGiftsRunning CableGift GivingWIndows Server 2008ProactiveE-CommerceGoogle MapsNear Field CommunicationSmart TechnologyWasting TimeMicrobloggingManagementServer MaintenanceCredit CardsVendorRobotSpywareCommunityWebsitesPayment CardsIT consultingAccessoryAdvertisingISPScalabilityWireless InternetInvestmentFAQSynciOSIntrantetExperienceEmployee-Employer RelationshipData storageData TheftEmployeeReliable ComputingPeripheralPDFComplianceWebinarHow ToBloggingGamificationImagesROITutorialChargerDistributed Denial of ServiceUpgradesBloatwareComputer FanMusicEdgeApp storeBreak/FixMicrosoft ExcelScreen MirroringEmployer Employee RelationshipText MessagingConsultantInbound MarketingMemoryWindows Server 2008 R2AdobeBooksTestingTouchpadCiminalFilesCo-managed ITMedical ITBrandingCastDebateBlack MarketFinancialHelp DeskDevelopmentMouseMonitorsElectronic Medical RecordsCameraAdminChromecastIdentity5GWIndows 7WebinarMicrsosoftPrint ServerNetwork CongestionLicensingNanotechnologyRegulationsSafetyProjectsOperating SysytemIT budgetKeyboard ShortcutsData PrivacyEmployeesLegislationBluetoothTrainingIT solutionsjunkEbayVirtual AssistantWorkersTabletsRoot Cause AnalysisCamerasPayroll