Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

SMBs Are Never Too Small for Hackers

SMBs Are Never Too Small for Hackers

Small businesses often fall into the trap of thinking that they are too small to be attacked. This misconception could ultimately cost your business too much. The fact of the matter is that all businesses have data that is worth something to hackers, and we’re here to prove it to you and offer a solution to this dilemma.

Continue reading
0 Comments

Mobile Malware Is Becoming a Bigger Problem

Mobile Malware Is Becoming a Bigger Problem

There was a time when people didn’t have to worry about getting computer viruses on their cell phones. Nowadays, with the exponential growth of mobile technologies, including application development options, mobile malware has become a problem, and it can be a big problem for your business. Today, we’ll take a look at the growing mobile malware market, from the threats to what you can do to keep it from being a problem for you.

Continue reading
0 Comments

Poking at Spear Phishing

Poking at Spear Phishing

Hopefully, you’ve heard of phishing at this point: the method cybercriminals use to scam their targets by impersonating someone that their targets would trust, requesting access credentials or other sensitive information. Did you know that there are specific kinds of phishing? Here, we’ll review one of the biggest risks to your business... spear phishing.

Continue reading
0 Comments

USB PC Killer Terrorizes Private College

USB PC Killer Terrorizes Private College

Network security is a priority for modern organizations of all kinds… after all, threats don’t often discriminate between the computer networks that they try to access. One kind of organization that should be especially diligent is the modern college or university. There are many different kinds of sensitive data stored there, including the personal, medical, and financial trifecta, along with intellectual property.

Continue reading
0 Comments

Down and Out in Cyberspace

Down and Out in Cyberspace

There has been a lot made in the media about the effect that movies and television has had on society. More often than not, the media that is produced is a result of the ebbs and flows that happen in society, which ironically makes the whole notion that television and movies affect society an interesting paradox. The ludicrous portrayal of criminality in media is one issue that is resoundingly debated by lawmakers and sociologists, alike.

Continue reading
0 Comments

This Scammer Raid Proves Just How Useful Monitoring Can Be

This Scammer Raid Proves Just How Useful Monitoring Can Be

It can be easy to underestimate the importance of monitoring your solutions, to adopt an “out of sight, out of mind” mentality. However, the benefits of persistent monitoring were recently thrust into the spotlight, when 24 spammers were arrested in October by the Delhi Police’s cyber cell for impersonating Microsoft support staff and duping American citizens.

Continue reading
0 Comments

Here Is a List of this Year’s Most Devastating Hacks

Here Is a List of this Year’s Most Devastating Hacks

Every business owner needs to consider how to approach network security. This is especially true with the litany of threats that face their organization’s network from simply being connected to the Internet. It may sound like an overstatement at first, but when you consider what some huge corporations--that have some very deep pockets--have dealt with very recently, it becomes evident that figuring out how to approach cybersecurity is one of the most important considerations any business owner has to make.

Continue reading
0 Comments

Getting to Know Technology: Hackers

Getting to Know Technology: Hackers

It doesn’t matter how much of a technology novice someone is, chances are, they’ve heard the term “hacker” before. A favorite character trope of Hollywood films and television dramas, these cybercriminals have appeared in productions like Die Hard and Mr. Robot with varying degrees of accuracy. Below, we explore what makes a hacker, and the kinds that exist in reality.

Continue reading
0 Comments

Despite Blockchain Security, Cryptocurrency Has Thieves Too

Despite Blockchain Security, Cryptocurrency Has Thieves Too

Cryptocurrencies are still one of the better known uses of blockchain technology, and though their values seem to have leveled off since the explosive growth they experienced a few months ago, that has not stopped people from seeking them out. Of course, where there’s money to be had, you’re sure to find cybercriminals.

Continue reading
0 Comments

Can You Spot the Bait in a Phishing Attack?

Can You Spot the Bait in a Phishing Attack?

Hackers are always trying to find creative and new ways to steal data and information from businesses. While spam (unwanted messages in your email inbox) has been around for a very long time, phishing emails have risen in popularity because they are more effective at achieving the desired endgame. How can you make sure that phishing scams don’t harm your business in the future?

Continue reading
0 Comments

It’s Decided: You’re More Likely to be Phished than Breached

It’s Decided: You’re More Likely to be Phished than Breached

Few security problems are more dangerous than a network breach. Considering how much you could lose from an unexpected bout with a hacker, it’s no surprise that businesses are concerned. Yet, even some of the most troublesome threats like phishing attacks are often ignored. A new study introduces the groundbreaking thought that phishing attacks should be at the forefront of a business owner’s mind regarding network security.

Continue reading
0 Comments

Virginia To Upgrade Voting Machines. Hopefully Other States Follow Suit

Virginia To Upgrade Voting Machines. Hopefully Other States Follow Suit

The 2016 United States presidential election was an ugly one for multiple reasons--chief among them the accusation that hacked voting machines could have altered the outcome of the election significantly. Thankfully, there are steps being taken to alleviate the worries that third parties might alter the outcome of such important events.

Continue reading
0 Comments

Social Media: The Most Effective Tool for Phishing Scams

Social Media: The Most Effective Tool for Phishing Scams

One thing that both fishing and phishing have in common is the use of lures. With the right lure, the chance of successfully catching the target improves. When it comes to the digital lures seen in phishing scams, research shows that social media is the most effective.

Continue reading
0 Comments

9 Types of Hackers You Need to Know About

9 Types of Hackers You Need to Know About

When you hear the term “hacker,” what do you imagine? You likely see what many see, a lone user hunched over a computer, creating chaos for chaos’ sake. However, this is a dangerously narrow view of those who qualify as “hackers.”

Continue reading
0 Comments

Tip of the Week: How You Can Beat These 4 Common Scams

Tip of the Week: How You Can Beat These 4 Common Scams

Cybersecurity is one of the most important aspects of running a business. Therefore, here are some of the best ways that your employees can contribute to your company’s technology security practices.

Continue reading
0 Comments

What’s a Rootkit Hack and How Can You Stop It?

What’s a Rootkit Hack and How Can You Stop It?

There are many types of online threats that the average business owner needs to understand and be prepared for. The problem here is that no two threats are alike, and they all perform different functions. One thing that all threats have in common is that they want to disrupt your operations in any way possible. To help you better prepare your organization for these threats, we’ll discuss a particularly dangerous malware: the rootkit hack.

Continue reading
0 Comments

Why Small Businesses Need to Think Big When it Comes to Network Security

Why Small Businesses Need to Think Big When it Comes to Network Security

There are benefits to being a small business. Being small provides all sorts of flexibility, including the ability to make decisions quickly and without having to go through so many hoops. Plus, you have a smaller workforce, which makes for a more personal experience. However, this also leads to a rather unfortunate side-effect of believing that you’re immune to being hacked.

Continue reading
0 Comments

Honor Among Hackers? Not for Those Who Hack Hospitals

Honor Among Hackers? Not for Those Who Hack Hospitals

It’s safe to say that hacking is a frowned-upon practice, but that hasn’t stopped cyber criminals from attempting to turn a profit off of it. This practice has led them to target nonconventional organizations, including hospitals and other healthcare facilities. However, just because a hacker can target a hospital, does this mean that they should? This is a topic of some debate amongst hackers, whom, believe it or not, actually do have some sort of ethical standards.

Continue reading
0 Comments

Tip of the Week: 5 Best Security Practices Hackers Hate

Tip of the Week: 5 Best Security Practices Hackers Hate

Hackers are always trying to come up with new ways to steal or corrupt sensitive data. If you don’t take the opportunity to protect your systems, you could be staring down a major data loss incident or security discrepancy. Here are five ways that you can protect your business’s infrastructure from hackers waiting to steal your data.

Continue reading
0 Comments

Why Hackers Want You to Vote in the Upcoming Election

Why Hackers Want You to Vote in the Upcoming Election

Tomorrow is the big day--the day when the American people cast their votes for the next President of the United States. While there may still be a few undecided voters out there, something that they may not be considering includes the machines that they will be using to cast their ballots. It turns out that there may be a major problem with some voting systems in the form of weak cyber security.

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

SecurityTip of the WeekTechnologyBest PracticesPrivacyInternetCloudMicrosoftBusiness ComputingSoftwareHackersGoogleEfficiencyBusiness ManagementInnovationHosted SolutionsProductivityBackupUser TipsWorkplace TipsManaged Service ProviderMalwareMobile DevicesBusinessNetwork SecurityIT ServicesProductivityHardwareComputerUpgradewindowsCommunicationEmailDataGadgetsSmartphonesIT SupportMiscellaneousSaving MoneyVirtualizationAppsWindows 10SmartphoneNetworkDisaster RecoveryBusiness ContinuitySmall BusinessVoIPBrowserServerMicrosoft OfficeMobile Device ManagementTech TermSocial MediaHealthInformation TechnologyAndroidMobile ComputingQuick TipsPasswordsData BackupCybersecurityHolidayMobile OfficeWindows 10Operating SystemData RecoveryGoing GreenOffice 365ChromecommunicationsOfficeSave MoneyUsersOutsourced ITCybercrimeBYODAppApplicationInternet of ThingsAlertEmployer-Employee RelationshipBest PracticeCollaborationspamIT SupportMarketingRansomwareSearchData SecurityLaw EnforcementManaged IT ServicesRemote ComputingAppleVendor ManagementWiFiBring Your Own DevicePhishingThe Internet of ThingsFacebookTabletWearable TechnologyWirelessHistoryMoneyHackingRouterWireless TechnologyBDRiPhoneUser ErrorRemote MonitoringRisk ManagementMobilityCost ManagementAntivirusUnified Threat ManagementAvoiding DowntimeAutomationMaintenanceSaving TimeOffice TipsPasswordCustomer Relationship ManagementIT SolutionsCloud ComputingTech SupportBig DataData ManagementComputersEncryptionSocialTelephone SystemsOneNoteGovernmentArtificial IntelligenceHard DrivesBandwidthUpdateNet NeutralityEducationUnsupported SoftwarePrinterWi-FiShortcutOutlookVulnerabilityGmailUSBPowerPointNetworkingAnalyticsGoogle DriveProactive ITFirewallBudgetLithium-ion batteryCurrent EventsPhone SystemSocial NetworkingVPNHumorInformationManaged IT ServicesTwo-factor AuthenticationWebsiteadministrationTelevisionRetailExcelWork/Life BalancePaperless OfficeManaged ServiceDisasterMeetingsMobile DeviceTelephonyPoliticsTravelSocial EngineeringStreaming MediaTrendingApplicationsIT COnsultantAuditEntertainmentManaged ITComputer RepairBatteryIntranetRecoveryPersonal InformationLaptopAugmented RealityBlockchainContent FilteringIdentity TheftVirusWordConferencingStorageGoogle AssistantIT ManagementhackerDisplayAmazonDevicesOneDriveLegalHosted SolutionTransportationFax ServerCommercePatch ManagementBusiness IntelligenceEnd of SupportData LossFlexibilityWindows 8Customer ServiceComputingFraudBiometricsGoogle DocsPrivate CloudVirtual RealityBusiness TechnologyData StorageScamHIPAAInternet ExlporerWireless ChargingHuman ResourcesDDoSFile SharingMobile SecurityWannaCryData BreachInstant MessagingEmailsProject ManagementTouchscreenCortanaOnline CurrencyHybrid CloudSportsEvernoteBenefitsSamsungeWasteComputer AccessoriesAccess ControlSaaSYoutubeAutomobileValueCleaningPoint of SalePrinter ServerHaaSPrintingSave TimeData ProtectionProgrammingManaging StressHard DriveTwitterUninterrupted Power SupplyComputer CareSalesSolid State DriveWorker CommutejunkAdministratorCo-managed ITSoftware as a ServicePayrollSettingsDevice SecurityKeyboardCamerasUserVideo GamesImagesHyperlinkVoice over Internet ProtocolSharePointWebinarWindows InkHard Disk DriveGiftsfilterAccessComputer ForensicsSecurity CamerasVirtual DesktopHiring/FiringWIndows Server 2008PresentationBest AvailableWasting TimePrint ServerSabotageProactiveTeamworkGoogle MapsManagementCredit CardsScienceVendorMachine LearningSpywareSmart TechnologyHelp DeskEbayAccessoryPCWebsitesDebateWireless InternetFAQRobotEmployee-Employer RelationshipDowntimeBuisnessSyncAdvertisingScalabilityPeripheralSmartwatchData TheftRunning CableGamificationiOSChargerExperienceData storagePDFE-CommerceEdgeNear Field CommunicationUpgradesMicrosoft ExcelHow ToServer MaintenanceApp storeMemoryComputer FanMusic3D PrintingText MessagingTestingSurge ProtectorPayment CardsScreen MirroringLifestyleCiminalEmployer Employee RelationshipAdobeIT consultingConsultantInvestmentFinancialBooksTouchpadReliable ComputingCameraEmployeeCastDistributed Denial of ServiceBlack MarketComplianceROIIdentityMonitorsBloatwareElectronic Medical RecordsProjectsBreak/FixIT budgetLicensingWebinarLegislationInbound MarketingData PrivacyCommunityVirtual AssistantFilesNanotechnologyNokiaWorkersSafetyOperating SysytemISPWindows 7Medical ITGift GivingBrandingTrainingTabletsIT solutionsComparisonIntrantetMouseChromebookAlexa for BusinessAdminChromecastRoot Cause AnalysisUpdatesHBOWIndows 7BloggingCo-Managed ServicesTutorial5GIdentitiesCompany CultureMicrobloggingNFLWindows 10sSpecificationsNetwork CongestionKeyboard ShortcutsMicrosoft WordRegulationsReputationTelephoneEmployeesLanguageBluetooth