Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Annoyed By Fake Friend Requests on Facebook? Here’s an Easy Fix

Tip of the Week: Annoyed By Fake Friend Requests on Facebook? Here’s an Easy Fix

Have you ever gotten Facebook requests from strange people who you don’t know? While it might be tempting to give them the benefit of the doubt--after all, maybe they know a friend of yours--it’s best to keep strangers off of your page when you can. In order to give your page, the flexibility to accept friend requests from people you may know, and protect it from strangers, you can implement a “follow” feature, and limit who can send you friend requests.

Continue reading
0 Comments

Tip of the Week: How to Download Everything You’ve Posted to Facebook

Tip of the Week: How to Download Everything You’ve Posted to Facebook

If you’ve had your Facebook profile since the dawn of the social media age, chances are that it’s accumulated an immense amount of personal information. While you might have felt weird handing over all of this data to Facebook, the company has made it surprisingly easy to take it back; well, as much as you can, at least.

Continue reading
0 Comments

Tip of the Week: 4 Ways to Get a Handle on Social Media in the Workplace

Tip of the Week: 4 Ways to Get a Handle on Social Media in the Workplace

Social media may be a great way to connect with other professionals and communicate with your friends, but it can be dangerous if you have poor posting habits. Before you share something, think twice about whether it contains any sensitive information that could be risky to yourself and your business.

Continue reading
0 Comments

Tip of the Week: 3 Ways to Secure Your Facebook Account

b2ap3_thumbnail_facebook_security_400.jpgThe social media revolution has taken the world by storm, so much in fact that some people are completely at the mercy of their smartphones. However, the dark side of social media, especially Facebook, grows more apparent every day, especially when it comes to both cybersecurity and personal privacy. Are you sure that your Facebook settings aren’t giving away a little too much of your information to the powers that be?

Continue reading
0 Comments

As the Facebook Empire Grows, the Acquisitions Keep Coming

b2ap3_thumbnail_facebook_is_buying_400.jpgIt's no secret that Facebook is one of the most visited sites on the Internet. In fact, according to the Alexa rankings, which measure website traffic, facebook.com is ranked second after only Google.com. With this much exposure, and the emanated revenue that comes from this kind of traffic, it has become important for the world's largest and most successful social network to scout out and eliminate possible competitors, many times before those companies even consider themselves potential competitors.

Continue reading
0 Comments

Get Your Business Started with Facebook

b2ap3_thumbnail_facebook_for_business_400.jpgSocial media isn't just some fad used by teenagers and twenty-somethings. It's not only a place to share pictures of your favorite dish, your status about your spouse, or where you can get the best deal on the latest war video game. Social media is a virtual powerhouse in the business world as well, and as it continues to grow, you must find a way to harness its potential and utilize it to give your organization an advantage. Where should you begin on your journey to social media proficiency? The answer is easy: Facebook.

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

SecurityTip of the WeekTechnologyBest PracticesPrivacyInternetCloudMicrosoftSoftwareBusiness ComputingBusiness ManagementGoogleHackersEfficiencyProductivityHosted SolutionsBackupManaged Service ProviderUser TipsMalwareInnovationBusinessWorkplace TipsMobile DevicesHardwareIT ServiceswindowsComputerUpgradeNetwork SecurityIT SupportSaving MoneyMiscellaneousEmailDataSmartphonesWindows 10VirtualizationBusiness ContinuitySmartphoneCommunicationAppsGadgetsVoIPProductivityDisaster RecoveryBrowserMicrosoft OfficeServerMobile Device ManagementNetworkInformation TechnologyMobile ComputingSmall BusinessTech TermQuick TipsPasswordsAndroidSocial MediaHealthOperating SystemData BackupGoing GreenCybersecurityHolidayMobile OfficeChromeAppspamAlertBest PracticeCollaborationOffice 365Save MoneyCybercrimecommunicationsApplicationOfficeEmployer-Employee RelationshipManaged IT ServicesBYODWindows 10MarketingData RecoveryOutsourced ITData SecurityLaw EnforcementRansomwareWiFiThe Internet of ThingsTabletSearchWearable TechnologyRemote ComputingAppleUsersInternet of ThingsVendor ManagementRouterWireless TechnologyBring Your Own DeviceBDRIT SupportMoneyFacebookiPhoneUser ErrorRemote MonitoringRisk ManagementAntivirusUnified Threat ManagementCost ManagementHackingAvoiding DowntimeMaintenanceSaving TimePhishingMobilityHistoryBig DataEncryptionOneNoteGovernmentHard DrivesOffice TipsBandwidthPasswordData ManagementComputersSocialTelephone SystemsIT SolutionsCustomer Relationship ManagementTech SupportBudgetGmailUSBPhone SystemUnsupported SoftwarePowerPointAnalyticsCloud ComputingAutomationWi-FiProactive ITFirewallTwo-factor AuthenticationVulnerabilityUpdateLithium-ion batteryCurrent EventsGoogle DriveShortcutSocial NetworkingVPNArtificial IntelligenceHumorWebsiteNet NeutralityNetworkingPrinterWirelessOutlookManaged IT ServicesDisasterRecoveryWork/Life BalanceStreaming MediaMobile DevicePoliticsTrendingApplicationsAuditIT COnsultantIntranetExcelLaptopAugmented RealityComputer RepairBlockchainContent FilteringTravelInformationManaged ITVirusTelevisionSocial EngineeringEducationRetailPersonal InformationadministrationIdentity TheftSave TimeEntertainmentComputer CareComputingSportsBenefitsFraudGoogle DocseWastehackerComputer AccessoriesWindows 8Business TechnologySaaSValueWireless ChargingLegalTransportationAccess ControlCommerceHaaSEnd of SupportMobile SecurityData BreachFlexibilityManaging StressProject ManagementCortanaOnline CurrencyStorageEvernoteData StorageScamHosted SolutionBusiness IntelligencePoint of SaleMeetingsWannaCryPrinter ServerTelephonyCustomer ServiceBiometricsTouchscreenData ProtectionWordTwitterProgrammingGoogle AssistantSamsungPrivate CloudVirtual RealityUninterrupted Power SupplySalesHard DriveBatteryDisplayHIPAAAmazonInternet ExlporerHuman ResourcesManaged ServiceDevicesAutomobilePaperless OfficeCleaningDDoSEmailsInstant MessagingFax ServerPatch ManagementData LossEbayDistributed Denial of ServiceReputationAccessoryWebsitesComplianceWireless InternetFAQBloatwareWorker CommuteAdministratorEmployee-Employer RelationshipDebateHelp DeskSolid State DriveSyncSettingsKeyboardPeripheralData TheftInbound MarketingGamificationChargerFilesVideo GamesBrandingAccessEdgeHard Disk DriveMicrosoft ExcelHiring/FiringMouseApp storeMemory3D PrintingChromecastSurge ProtectorTestingWIndows 7CiminalAdobeFile SharingSmart TechnologyNetwork CongestionFinancialRegulationsLifestyleBluetoothRobotCameraAdminAdvertisingIdentityjunkHybrid CloudCamerasScalabilityExperienceSharePointData storageProjectsUserIT budgetKeyboard ShortcutsiOSLicensingLegislationPDFData PrivacyfilterVirtual AssistantPresentationWorkersUpgradesHow ToCommunityVirtual DesktopMusicTeamworkWindows 7Best AvailablePayrollComputer FanISPTabletsScreen MirroringIntrantetComparisonEmployer Employee RelationshipText MessagingScienceNokiaChromebookGift GivingAlexa for BusinessUpdatesConsultantHBOBooksBloggingTouchpadTutorialCo-Managed ServicesYoutubeIdentitiesSecurity CamerasNFLPrintingCastSpecificationsBuisnessMicrobloggingMicrosoft WordBlack MarketElectronic Medical RecordsRunning CableTelephoneLanguageMachine LearningMonitorsConferencingSoftware as a ServiceNear Field CommunicationDevice SecurityWebinarIT ManagementCo-managed ITWindows InkSafetyOperating SysytemHyperlinkNanotechnologyComputer ForensicsGiftsTrainingIT consultingWebinarImagesIT solutionsWIndows Server 2008OneDriveGoogle MapsPrint ServerWasting TimeProactiveRoot Cause AnalysisManagementCredit CardsCompany CultureVendorReliable ComputingSpywareWindows 10s