Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

3 Ways Email Encryption Keeps Your Messages Safe

3 Ways Email Encryption Keeps Your Messages Safe

Encryption is a very important tool in today’s business environment, especially if you are trying to protect your email communications. Today, we’ll discuss the benefits of using encryption for your business’ communications solutions, but without an understanding of what encryption actually is, the conversation might be a little harder to understand.

Continue reading
0 Comments

Tip of the Week: How to Determine Which VPN is Best

Tip of the Week: How to Determine Which VPN is Best

Many computer users are afraid for their privacy--and judging by the discussions surrounding the FCC and Net Neutrality, they should be. Now that users are responsible for the privacy of their online activity, they are finding new ways to make sure that corporations aren’t taking advantage of their Internet activity--namely through the use of a Virtual Private Network, or VPN.

Continue reading
0 Comments

FBI Director Insists Government Can Access Any Private Record

FBI Director Insists Government Can Access Any Private Record

Does the U.S. Constitution allow the American government to access the electronic devices of its citizens? According to FBI Director James Comey’s statements at Symantec’s Annual Government Symposium, it certainly does.

Continue reading
0 Comments

Give Tech Security Credit When Credit Is Due

b2ap3_thumbnail_technology_security_credit_400.jpgWe talk a lot about viruses or holes in supposedly sound security structures, but today it seems as if that's all there is to talk about. It's all about the latest vulnerability, or a hacking attack that left millions of people with compromised passwords. People always concentrate on the negative aspects of things without looking at the positives.

Continue reading
0 Comments

Is It Possible to Encrypt the Entire Internet?

b2ap3_thumbnail_encrypt_the_internet_400.jpgMany websites around the world are still suffering from the nasty little bug called Heartbleed that we covered last month. This prompted over 30,000 TLS/SSL certificates to be revoked and reissued, but many of them were reissued with the same keys. If this was going to happen, why revoke and reissue them in the first place? They're still just as vulnerable as before, since Heartbleed could have leaked those same keys weeks ago.

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

SecurityTip of the WeekTechnologyBest PracticesPrivacyCloudInternetMicrosoftBusiness ComputingSoftwareHackersEfficiencyGoogleBusiness ManagementInnovationProductivityHosted SolutionsBackupUser TipsWorkplace TipsManaged Service ProviderMalwareBusinessMobile DevicesNetwork SecurityIT ServicesProductivityHardwareComputerwindowsUpgradeCommunicationEmailDataIT SupportMiscellaneousSaving MoneyGadgetsSmartphonesVirtualizationAppsWindows 10SmartphoneDisaster RecoveryBusiness ContinuitySmall BusinessNetworkVoIPServerBrowserMicrosoft OfficeMobile Device ManagementTech TermInformation TechnologyHealthAndroidMobile ComputingSocial MediaPasswordsQuick TipsData BackupCybersecurityHolidayGoing GreenWindows 10Data RecoveryOperating SystemOffice 365Mobile OfficeSave MoneycommunicationsOfficeChromeBYODOutsourced ITCybercrimeApplicationAppInternet of ThingsEmployer-Employee RelationshipAlertBest PracticeUsersCollaborationspamIT SupportMarketingSearchRansomwareData SecurityLaw EnforcementManaged IT ServicesRemote ComputingTabletPhishingWearable TechnologyThe Internet of ThingsFacebookAppleVendor ManagementWiFiWirelessBring Your Own DeviceMoneyiPhoneHackingRisk ManagementCost ManagementRouterWireless TechnologyBDRMaintenanceSaving TimeMobilityUser ErrorRemote MonitoringHistoryAntivirusUnified Threat ManagementAutomationAvoiding DowntimeOffice TipsPasswordCloud ComputingIT SolutionsHard DrivesTech SupportData ManagementComputersBig DataSocialEncryptionTelephone SystemsArtificial IntelligenceOneNoteGovernmentCustomer Relationship ManagementBandwidthUpdateUnsupported SoftwareHumorWebsiteNet NeutralityEducationWi-FiShortcutPrinterVulnerabilityOutlookGmailUSBNetworkingSocial NetworkingGoogle DrivePowerPointAnalyticsProactive ITFirewallBudgetLithium-ion batteryPhone SystemCurrent EventsManaged IT ServicesInformationTwo-factor AuthenticationVPNWork/Life BalanceManaged ServiceExcelTelevisionRetailPaperless OfficeMobile DevicePoliticsMeetingsIT COnsultantTravelTelephonyComputer RepairSocial EngineeringApplicationsVirusStreaming MediaManaged ITBatteryEntertainmentTrendingadministrationAuditBlockchainPersonal InformationRecoveryIntranetDisasterIdentity TheftLaptopAugmented RealityContent FilteringWordStorageProgrammingTwitterDevicesLegalDisplayTransportationCommercePatch ManagementAmazonEnd of SupportHosted SolutionData LossFlexibilityOneDriveBusiness IntelligenceFraudFax ServerGoogle DocsCustomer ServiceBiometricsBusiness TechnologyData StorageScamComputingPrivate CloudVirtual RealityWireless ChargingYoutubeHIPAAMobile SecurityInternet ExlporerFile SharingWannaCryData BreachHuman ResourcesProject ManagementDDoSEmailsTouchscreenCortanaInstant MessagingEvernoteUninterrupted Power SupplySalesHard DriveHybrid CloudSamsungSportsBenefitsOnline CurrencyAccess ControleWasteComputer AccessoriesAutomobileCleaningSaaSValuePrintingSave TimeData ProtectionHaaSComputer CareWindows 8Point of SaleGoogle AssistantConferencingPrinter ServerIT ManagementManaging StresshackerjunkHyperlinkVoice over Internet ProtocolWindows InkVideo GamesCamerasAccessComputer ForensicsHard Disk DriveGiftsSharePointHiring/FiringWIndows Server 2008UserSecurity CamerasCo-managed ITfilterWasting TimeSabotageProactiveGoogle MapsVirtual DesktopPresentationManagementCredit CardsLifestyleMachine LearningSpywareTeamworkSmart TechnologyBest AvailableVendorAccessoryPCWebsitesScienceRobotPrint ServerWireless InternetFAQDowntimeSyncAdvertisingEmployee-Employer RelationshipPeripheralSmartwatchData TheftScalabilityBuisnessExperienceEbayData storageGamificationiOSChargerE-CommerceEdgeRunning CablePDFServer MaintenanceApp storeUpgradesMicrosoft ExcelNokiaHow ToGift GivingMusicNear Field CommunicationMemoryComputer FanTestingPayment CardsScreen MirroringCiminalEmployer Employee RelationshipAdobeText MessagingInvestmentConsultantBooksMicrobloggingIT consultingTouchpadFinancialCameraEmployeeCast3D PrintingBlack MarketROISurge ProtectorIdentityMonitorsElectronic Medical RecordsReliable ComputingProjectsBreak/FixIT budgetDistributed Denial of ServiceLicensingComplianceData PrivacyWebinarLegislationBloatwareNanotechnologyWorkersSafetyWebinarOperating SysytemImagesVirtual AssistantWindows 7Medical ITTrainingTabletsInbound MarketingChromebookFilesIT solutionsComparisonRoot Cause AnalysisUpdatesBrandingHBOAlexa for BusinessAdminCo-Managed Services5GIdentitiesCompany CultureNFLMouseCommunityChromecastWindows 10sSpecificationsISPMicrosoft WordIntrantetDebateWIndows 7ReputationHelp DeskKeyboard ShortcutsTelephoneEmployeesLanguageNetwork CongestionWorker CommuteBloggingRegulationsAdministratorTutorialSolid State DriveSettingsDevice SecurityBluetoothKeyboardSoftware as a ServicePayroll