Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

This Scammer Raid Proves Just How Useful Monitoring Can Be

This Scammer Raid Proves Just How Useful Monitoring Can Be

It can be easy to underestimate the importance of monitoring your solutions, to adopt an “out of sight, out of mind” mentality. However, the benefits of persistent monitoring were recently thrust into the spotlight, when 24 spammers were arrested in October by the Delhi Police’s cyber cell for impersonating Microsoft support staff and duping American citizens.

Continue reading
0 Comments

Here Is a List of this Year’s Most Devastating Hacks

Here Is a List of this Year’s Most Devastating Hacks

Every business owner needs to consider how to approach network security. This is especially true with the litany of threats that face their organization’s network from simply being connected to the Internet. It may sound like an overstatement at first, but when you consider what some huge corporations--that have some very deep pockets--have dealt with very recently, it becomes evident that figuring out how to approach cybersecurity is one of the most important considerations any business owner has to make.

Continue reading
0 Comments

Getting to Know Technology: Hackers

Getting to Know Technology: Hackers

It doesn’t matter how much of a technology novice someone is, chances are, they’ve heard the term “hacker” before. A favorite character trope of Hollywood films and television dramas, these cybercriminals have appeared in productions like Die Hard and Mr. Robot with varying degrees of accuracy. Below, we explore what makes a hacker, and the kinds that exist in reality.

Continue reading
0 Comments

Despite Blockchain Security, Cryptocurrency Has Thieves Too

Despite Blockchain Security, Cryptocurrency Has Thieves Too

Cryptocurrencies are still one of the better known uses of blockchain technology, and though their values seem to have leveled off since the explosive growth they experienced a few months ago, that has not stopped people from seeking them out. Of course, where there’s money to be had, you’re sure to find cybercriminals.

Continue reading
0 Comments

Can You Spot the Bait in a Phishing Attack?

Can You Spot the Bait in a Phishing Attack?

Hackers are always trying to find creative and new ways to steal data and information from businesses. While spam (unwanted messages in your email inbox) has been around for a very long time, phishing emails have risen in popularity because they are more effective at achieving the desired endgame. How can you make sure that phishing scams don’t harm your business in the future?

Continue reading
0 Comments

It’s Decided: You’re More Likely to be Phished than Breached

It’s Decided: You’re More Likely to be Phished than Breached

Few security problems are more dangerous than a network breach. Considering how much you could lose from an unexpected bout with a hacker, it’s no surprise that businesses are concerned. Yet, even some of the most troublesome threats like phishing attacks are often ignored. A new study introduces the groundbreaking thought that phishing attacks should be at the forefront of a business owner’s mind regarding network security.

Continue reading
0 Comments

Virginia To Upgrade Voting Machines. Hopefully Other States Follow Suit

Virginia To Upgrade Voting Machines. Hopefully Other States Follow Suit

The 2016 United States presidential election was an ugly one for multiple reasons--chief among them the accusation that hacked voting machines could have altered the outcome of the election significantly. Thankfully, there are steps being taken to alleviate the worries that third parties might alter the outcome of such important events.

Continue reading
0 Comments

Social Media: The Most Effective Tool for Phishing Scams

Social Media: The Most Effective Tool for Phishing Scams

One thing that both fishing and phishing have in common is the use of lures. With the right lure, the chance of successfully catching the target improves. When it comes to the digital lures seen in phishing scams, research shows that social media is the most effective.

Continue reading
0 Comments

9 Types of Hackers You Need to Know About

9 Types of Hackers You Need to Know About

When you hear the term “hacker,” what do you imagine? You likely see what many see, a lone user hunched over a computer, creating chaos for chaos’ sake. However, this is a dangerously narrow view of those who qualify as “hackers.”

Continue reading
0 Comments

Tip of the Week: How You Can Beat These 4 Common Scams

Tip of the Week: How You Can Beat These 4 Common Scams

Cybersecurity is one of the most important aspects of running a business. Therefore, here are some of the best ways that your employees can contribute to your company’s technology security practices.

Continue reading
0 Comments

What’s a Rootkit Hack and How Can You Stop It?

What’s a Rootkit Hack and How Can You Stop It?

There are many types of online threats that the average business owner needs to understand and be prepared for. The problem here is that no two threats are alike, and they all perform different functions. One thing that all threats have in common is that they want to disrupt your operations in any way possible. To help you better prepare your organization for these threats, we’ll discuss a particularly dangerous malware: the rootkit hack.

Continue reading
0 Comments

Why Small Businesses Need to Think Big When it Comes to Network Security

Why Small Businesses Need to Think Big When it Comes to Network Security

There are benefits to being a small business. Being small provides all sorts of flexibility, including the ability to make decisions quickly and without having to go through so many hoops. Plus, you have a smaller workforce, which makes for a more personal experience. However, this also leads to a rather unfortunate side-effect of believing that you’re immune to being hacked.

Continue reading
0 Comments

Honor Among Hackers? Not for Those Who Hack Hospitals

Honor Among Hackers? Not for Those Who Hack Hospitals

It’s safe to say that hacking is a frowned-upon practice, but that hasn’t stopped cyber criminals from attempting to turn a profit off of it. This practice has led them to target nonconventional organizations, including hospitals and other healthcare facilities. However, just because a hacker can target a hospital, does this mean that they should? This is a topic of some debate amongst hackers, whom, believe it or not, actually do have some sort of ethical standards.

Continue reading
0 Comments

Tip of the Week: 5 Best Security Practices Hackers Hate

Tip of the Week: 5 Best Security Practices Hackers Hate

Hackers are always trying to come up with new ways to steal or corrupt sensitive data. If you don’t take the opportunity to protect your systems, you could be staring down a major data loss incident or security discrepancy. Here are five ways that you can protect your business’s infrastructure from hackers waiting to steal your data.

Continue reading
0 Comments

Why Hackers Want You to Vote in the Upcoming Election

Why Hackers Want You to Vote in the Upcoming Election

Tomorrow is the big day--the day when the American people cast their votes for the next President of the United States. While there may still be a few undecided voters out there, something that they may not be considering includes the machines that they will be using to cast their ballots. It turns out that there may be a major problem with some voting systems in the form of weak cyber security.

Continue reading
0 Comments

Don’t Let Hollywood Fool You Into Thinking Hackers are the Good Guys

Don’t Let Hollywood Fool You Into Thinking Hackers are the Good Guys

There’s no question about it; hackers make things difficult for businesses of all industries and sizes. They go out of their way to steal data and turn a profit off of it, as well as misrepresent organizations and individuals. The business environment is chaotic enough without hackers mucking everything up. However, the recent hacking attacks behind the group Anonymous have evolved the persona of the typical hacker into something very different.

Continue reading
0 Comments

Alert: Newfound Vulnerability Proves Windows to Not Be as Secure as Previously Thought

Alert: Newfound Vulnerability Proves Windows to Not Be as Secure as Previously Thought

A vulnerability has been uncovered in all Windows systems - one that’s described as “probably the widest impact in the history of Windows.” Coined BadTunnel, the vulnerability could provide attackers a route directly past the defenses of a system to set up a man-in-the-middle style attack.

Continue reading
0 Comments

Alert: Users of 7-Zip Should Immediately Upgrade to the Latest Version

Alert: Users of 7-Zip Should Immediately Upgrade to the Latest Version

One of the latest vulnerabilities in open-source software can be found in 7zip, a file archiver and decompresser. 7zip has been found to have several security vulnerabilities which have software developers rushing to fix their products. The damage done extends far beyond 7zip, reaching both people who use 7zip itself, and developers who have used the technology in the creation of their own tools and software.

Continue reading
0 Comments

Forget Backdoors, Hackers Can Now Infiltrate Garage Doors

Forget Backdoors, Hackers Can Now Infiltrate Garage Doors

Hackers have proven that they will do whatever it takes to get to your valuable assets, even if it means taking advantage of physical objects that work alongside a specific frequency. As it turns out, this is exactly how hacking a garage door works, and all it takes is a decade-old communications device to capture the frequency and unlock any garage door that utilizes it.

Continue reading
0 Comments

How and Why Cyber Crime is so Effective

b2ap3_thumbnail_cyber_crime_is_the_new_norm_400.jpgThe Internet is a fantastic tool that has ushered in an era of productivity and connectivity that we could only previously have dreamed of. Unfortunately, like every great tool, it can be used for darker, malicious purposes. In the Internet’s case, it’s used for anonymous illegal activity, like drug trafficking or selling data on the black market.

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

SecurityTip of the WeekTechnologyBest PracticesPrivacyInternetCloudMicrosoftSoftwareBusiness ComputingBusiness ManagementHackersGoogleEfficiencyProductivityHosted SolutionsBackupManaged Service ProviderUser TipsWorkplace TipsMalwareBusinessInnovationMobile DeviceswindowsIT ServicesHardwareComputerUpgradeNetwork SecurityIT SupportSaving MoneyMiscellaneousEmailDataSmartphonesWindows 10VirtualizationBusiness ContinuityGadgetsCommunicationSmartphoneAppsProductivityVoIPDisaster RecoveryNetworkBrowserMicrosoft OfficeServerMobile Device ManagementSmall BusinessTech TermMobile ComputingInformation TechnologyAndroidQuick TipsPasswordsHealthSocial MediaOperating SystemMobile OfficeData BackupGoing GreenCybersecurityHolidayChromeCybercrimecommunicationsAppApplicationOfficeAlertBest PracticeOffice 365CollaborationspamSave MoneyWindows 10Data RecoveryOutsourced ITRansomwareEmployer-Employee RelationshipBYODMarketingData SecurityLaw EnforcementManaged IT ServicesAppleUsersThe Internet of ThingsVendor ManagementWiFiInternet of ThingsTabletSearchRemote ComputingWearable TechnologyRouterPhishingWireless TechnologyMoneyBDRIT SupportHistoryFacebookUser ErrorBring Your Own DeviceRemote MonitoringAntivirusUnified Threat ManagementiPhoneAvoiding DowntimeMobilityRisk ManagementCost ManagementMaintenanceSaving TimeHackingBig DataData ManagementComputersEncryptionSocialCustomer Relationship ManagementTelephone SystemsOneNoteGovernmentBandwidthHard DrivesOffice TipsPasswordIT SolutionsTech SupportUnsupported SoftwareGmailUSBPowerPointCloud ComputingNetworkingAnalyticsWi-FiProactive ITVulnerabilityFirewallBudgetLithium-ion batteryGoogle DriveCurrent EventsPhone SystemArtificial IntelligenceAutomationVPNHumorTwo-factor AuthenticationWebsiteUpdateNet NeutralitySocial NetworkingWirelessPrinterShortcutOutlookVirusTravelWork/Life BalanceadministrationSocial EngineeringMobile DeviceDisasterStreaming MediaPoliticsTrendingAuditIntranetRecoveryLaptopAugmented RealityContent FilteringApplicationsManaged ITIT COnsultantPersonal InformationComputer RepairBlockchainEducationTelevisionRetailExcelIdentity TheftInformationManaged IT ServicesGoogle AssistantMeetingsUninterrupted Power SupplyhackerTelephonySalesCustomer ServiceHard DriveComputingBiometricsPrivate CloudVirtual RealityManaged ServiceDevicesLegalHIPAATransportationEnd of SupportInternet ExlporerCommercePatch ManagementFlexibilityHuman ResourcesDDoSInstant MessagingEmailsFraudGoogle DocsWindows 8Online CurrencyScamSportsBusiness TechnologyEntertainmentData StorageBenefitseWasteComputer AccessoriesWireless ChargingAccess ControlMobile SecuritySaaSValueWannaCryData BreachPoint of SaleProject ManagementPrinter ServerTouchscreenCortanaHaaSEvernoteSamsungProgrammingManaging StressTwitterBatteryStorageDisplayAutomobileAmazonCleaningPaperless OfficeHosted SolutionSave TimeData ProtectionFax ServerComputer CareWordBusiness IntelligenceEbaySolid State DriveConferencingWorker CommuteAdministratorSoftware as a ServiceSettingsDevice SecurityKeyboardIT ManagementWindows InkVideo GamesBuisnessHyperlinkComputer ForensicsHard Disk DriveGiftsAccessRunning CableWebinarImagesHiring/FiringWIndows Server 2008Google MapsWasting TimeNear Field CommunicationProactiveManagementCredit CardsVendor3D PrintingSpywareSmart TechnologyWebsitesData LossSurge ProtectorAccessoryIT consultingWireless InternetFAQRobotSyncAdvertisingDebateEmployee-Employer RelationshipHelp DeskReliable ComputingData TheftScalabilityPeripheralDistributed Denial of ServiceGamificationComplianceiOSChargerExperienceData storagePDFBloatwareEdgeApp storeUpgradesMicrosoft ExcelHow ToMemoryInbound MarketingComputer FanMusicCommunityEmployer Employee RelationshipAdobeText MessagingFilesTestingScreen MirroringCiminalISPConsultantFile SharingBrandingTouchpadIntrantetMouseFinancialBooksLifestyleChromecastCameraCastAdminWIndows 7IdentityBloggingTutorialBlack MarketNetwork CongestionHybrid CloudMonitorsElectronic Medical RecordsLicensingProjectsRegulationsIT budgetKeyboard ShortcutsData PrivacyWebinarLegislationBluetoothOperating SysytemVirtual AssistantjunkNanotechnologyWorkersSafetyCo-managed ITTrainingTabletsWindows 7CamerasPayrollUserChromebookIT solutionsComparisonNokiaSharePointGift GivingAlexa for BusinessfilterRoot Cause AnalysisUpdatesHBOCompany CultureNFLYoutubeVirtual DesktopCo-Managed ServicesPresentationIdentitiesSecurity CamerasOneDriveBest AvailablePrintingWindows 10sSpecificationsPrint ServerTeamworkReputationMicrobloggingScienceMicrosoft WordTelephoneLanguageMachine Learning