Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Small Business Bill Promotes Technology Use

Small Business Bill Promotes Technology Use

In order for small businesses to remain competitive in this economy, there has to be the opportunity for them to participate as a viable competitor. This is the goal of a United States bill that has passed through the House of Representatives and is moving forward to be voted on by the Senate.

Continue reading
0 Comments

Hacking Group Claims to Have Stolen NSA Cyber Weapons

Hacking Group Claims to Have Stolen NSA Cyber Weapons

Every security professional’s worst nightmare consists of the National Security Agency (NSA) being hacked. While there’s no proof that the NSA itself has been hacked, there is some evidence to suggest that some of the exploits used by the agency are up for grabs on the black market. What this means is that a lucky group of hackers could potentially get their hands on some very dangerous tools.

Recent comment in this post
Caitlyn Hawkins
Weapons on the internet is only be kind that cyber weapons that will also be useful when to coming it up by the looking forwards. ... Read More
Saturday, 22 June 2019 07:17
Continue reading
1 Comment

Is the Reform of ECPA Enough to Prevent the Government From Reading Your Emails?

Is the Reform of ECPA Enough to Prevent the Government From Reading Your Emails?

How private are your emails and other digital communications? Can the government go through your digital files without you knowing about it? As you may have suspected, they can, thanks to a loophole in an outdated law--a loophole that U.S. lawmakers are trying to close.

Continue reading
0 Comments

If a Teen Can Hack the CIA, Your Business Needs to Prioritize In Security

b2ap3_thumbnail_cia_hacked_400.jpgWe write about cyber security all of the time, and for good reason. You need to be sure that your organization’s defenses are bulletproof, or at least optimized for maximum security. A recent debacle in the United States serves as a reminder that even high-level, super-secret government accounts can be hacked, like this story from the Central Intelligence Agency (CIA).

Continue reading
0 Comments

Even the White House Needs IT Services

b2ap3_thumbnail_white_house_needs_it_services_400_20140815-144622_1.jpgA change is happening in the White House. Mikey Dickerson, a Google site reliability engineer, has just been appointed by the United States government as the deputy federal CIO, proving that even the big wigs need consulting from time-to-time.

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

SecurityTip of the WeekTechnologyBest PracticesPrivacyCloudInternetMicrosoftBusiness ComputingSoftwareHackersEfficiencyGoogleBusiness ManagementInnovationProductivityHosted SolutionsBackupUser TipsWorkplace TipsManaged Service ProviderMalwareNetwork SecurityBusinessMobile DevicesIT ServicesProductivityHardwareComputerwindowsUpgradeCommunicationEmailDataIT SupportMiscellaneousSaving MoneyGadgetsSmartphonesVirtualizationAppsWindows 10SmartphoneDisaster RecoveryBusiness ContinuitySmall BusinessNetworkVoIPServerBrowserMicrosoft OfficeMobile Device ManagementInformation TechnologyAndroidHealthTech TermMobile ComputingSocial MediaPasswordsQuick TipsCybersecurityData BackupHolidayGoing GreenData RecoveryOperating SystemOffice 365Mobile OfficeWindows 10communicationsOfficeChromeSave MoneyCybercrimeBYODOutsourced ITApplicationInternet of ThingsEmployer-Employee RelationshipAppspamAlertBest PracticeUsersCollaborationData SecurityMarketingRansomwareSearchLaw EnforcementManaged IT ServicesIT SupportRemote ComputingPhishingTabletThe Internet of ThingsWearable TechnologyFacebookWirelessAppleVendor ManagementWiFiBring Your Own DeviceiPhoneRisk ManagementRouterCost ManagementWireless TechnologyBDRMobilityMaintenanceSaving TimeAutomationUser ErrorRemote MonitoringUnified Threat ManagementAntivirusHistoryAvoiding DowntimeHackingMoneySocialIT SolutionsTelephone SystemsTech SupportHard DrivesBig DataEncryptionArtificial IntelligenceOneNoteGovernmentBandwidthCustomer Relationship ManagementOffice TipsPasswordCloud ComputingComputersData ManagementNet NeutralityVulnerabilityEducationNetworkingPrinterOutlookGoogle DriveInformationGmailUSBBudgetPowerPointSocial NetworkingPhone SystemAnalyticsProactive ITFirewallTwo-factor AuthenticationManaged IT ServicesLithium-ion batteryUpdateCurrent EventsUnsupported SoftwareVPNShortcutWi-FiHumorWebsiteMobile DevicePoliticsTelevisionBlockchainRetailPaperless OfficeSocial EngineeringIT COnsultantWordComputer RepairEntertainmentManaged ITRecoveryManaged ServiceBatteryPersonal InformationStreaming MediaVirusTrendingAuditIdentity TheftadministrationIntranetExcelLaptopAugmented RealityContent FilteringDisasterWork/Life BalanceApplicationsMeetingsTravelTelephonyFlexibilityBiometricsVirtual RealityDisplayPrivate CloudAmazonHIPAAInternet ExlporerData StorageOneDriveScamHuman ResourcesFax ServerPrintingDDoSInstant MessagingData ProtectionEmailsComputingWannaCryGoogle AssistantConferencingSportsIT ManagementBenefitsTouchscreenComputer AccessorieseWasteDevicesYoutubeSamsungValueSaaSPatch ManagementAutomobileData LossHard DriveCleaningUninterrupted Power SupplyHaaSSalesFraudOnline CurrencyGoogle DocsManaging StressStorageSave TimeComputer CareBusiness TechnologyhackerWireless ChargingPoint of SaleMobile SecurityFile SharingPrinter ServerHosted SolutionData BreachLegalProject ManagementWindows 8Business IntelligenceTransportationAccess ControlCortanaTwitterEvernoteCustomer ServiceCommerceProgrammingHybrid CloudEnd of SupportProjectsIT budgetBuisnessLicensingCo-managed ITData PrivacyRobotAdminRunning CableLegislationWorkersVirtual AssistantAdvertising5GWindows 7ScalabilityTabletsNear Field CommunicationiOSExperienceChromebookLifestyleData storageKeyboard ShortcutsComparisonEmployeesPrint ServerUpdatesHBOAlexa for BusinessPDFCo-Managed ServicesHow ToIdentitiesNFLIT consultingUpgradesComputer FanMusicPayrollSpecificationsVoice over Internet ProtocolMicrosoft WordScreen MirroringEmployer Employee RelationshipEbayText MessagingTelephoneLanguageReliable ComputingConsultantComplianceBooksTouchpadSecurity CamerasDistributed Denial of ServiceSabotageDevice SecurityBloatwareCastSoftware as a ServiceHyperlinkBlack MarketNokiaWindows InkMonitorsInbound MarketingElectronic Medical RecordsComputer ForensicsGift GivingMachine LearningGiftsPCFilesWIndows Server 2008Webinar3D PrintingWasting TimeProactiveBrandingGoogle MapsMouseNanotechnologySafetyManagementOperating SysytemDowntimeSurge ProtectorCredit CardsMicrobloggingSmartwatchChromecastSpywareTrainingVendorIT solutionsAccessoryWebsitesWIndows 7Network CongestionRoot Cause AnalysisWireless InternetE-CommerceFAQServer MaintenanceSyncRegulationsCompany CultureEmployee-Employer RelationshipWindows 10sPeripheralData TheftBluetoothImagesjunkGamificationReputationPayment CardsChargerWebinarInvestmentEdgeCamerasSolid State DriveWorker CommuteCommunityApp storeAdministratorSharePointMicrosoft ExcelUserSettingsfilterISPKeyboardMemoryEmployeeVideo GamesROICiminalVirtual DesktopAdobePresentationIntrantetTestingHard Disk DriveAccessTeamworkBest AvailableScienceHelp DeskHiring/FiringBloggingFinancialBreak/FixTutorialDebateCameraIdentitySmart TechnologyMedical IT