Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Five Gadgets for the Techie in Your Life

Five Gadgets for the Techie in Your Life

With the holiday season in full swing, finding good gifts for the technology lover in your life may actually be more frustrating than you’d think. Since there are so many options, people will often get paralysis from trying to find the right gift and end up going the gift card route. Today we will look at five great gift ideas for the technology fan in your life.

Continue reading
0 Comments

Cybersecurity Can't Stop During the Holidays

Cybersecurity Can't Stop During the Holidays

This Christmas, technology is everywhere. Traditionally, the holidays were a time when things slowed down for businesses and people spent time with their families and put their work on the back burner. Those days are over. Today’s professional is lucky to get a day off for Christmas; and, because of the way business works today, may be asked to do more than ever around the holidays.

Continue reading
0 Comments

Need Gift Ideas? Try Out These Gadgets!

Need Gift Ideas? Try Out These Gadgets!

The holidays are getting closer, and picking the right gift for someone is only becoming a more stressful activity. To make things a little easier for you, we’ve found some gadgets that might make the perfect gift for that person on your list who has a particular interest. This blog will go over some of these interests and the gifts that might make their holiday.

Continue reading
0 Comments

This Halloween, Remember to Check Your Kids’ Mobile Devices for Ransomware

This Halloween, Remember to Check Your Kids’ Mobile Devices for Ransomware

Halloween is a time when we celebrate what scares us, like ghosts, goblins, ghouls, and the like. For adults, the holiday becomes more lighthearted with each passing year, due to the understanding that such monsters are fictional. Yet, there exists real monsters who know how to play on people’s fears, namely, hackers.

Continue reading
0 Comments

Choosing Between the Top 3 Video-Streaming Services is Tough

b2ap3_thumbnail_give_video_streaming_apps_400.jpgThe perfect holiday gift needs to be something meaningful. Now, a meaningful gift could be something sentimental, or it could be useful. If you’re looking to give a gift that will get plenty of use throughout the year, then consider giving a video-streaming service subscription.

Continue reading
0 Comments

If Classic Monsters Were Computer Viruses

b2ap3_thumbnail_halloween_it_400.jpgWhat’s scarier, monsters or computer viruses? While it would be horrifying to be caught in a dark alley with a vampire, it would also be terrifying to lose your data to a hacker. Each entity is scary in its own right, but how frightening would it be if the two were combined?

Continue reading
0 Comments

Your Droid Phone is Inferior to the Greatest Droid of All, R2-D2

b2ap3_thumbnail_r2d2_400.jpgIn 1977 the first Star Wars movie premiered, entitled “A New Hope.” The science-fiction film became a hit and spawned a franchise that’s still going strong 38 years later, with the upcoming release of its much-anticipated seventh feature film, “The Force Awakens.” In fact, Star Wars is such a big deal that it has its own holiday, celebrated every May 4th (May the 4th be with you).

Continue reading
0 Comments

Cat Tech Support: You’ve Gotta Be Kitten Me!

b2ap3_thumbnail_kitty_tech_support_400.jpgUnless you’ve been living under a rock, you know that cat memes infest the Internet to the point where it’s difficult to not see one. But, have you considered that it might not be that people are obsessed with cats, and that maybe the cats are simply overwhelmed by their ego as a superior race? Perhaps cats understand technology far better than even humans do, and they are the masterminds behind why the Internet has gone cat-crazy.

Continue reading
0 Comments

Look Out Behind You, it’s World Backup Day!

b2ap3_thumbnail_world_backup_day_3_400.jpgYou shouldn’t need to be convinced that the Internet is a dangerous place. Hackers are lurking around every corner, waiting to breach your network and snatch your data. Despite this risk, many computer users need convincing to back up their data; a task that minimizes the negative effects associated with data loss. This is why March 31st is officially known as World Backup Day.

Continue reading
0 Comments

An IT Christmas Carol

b2ap3_thumbnail_an_it_christmas_carol_400.jpgA technology-based parody of the classic Christmas story, “A Christmas Carol,” by Charles Dickens.

Once upon a time, in a land not much different from this one, there lived a business owner. His name was Scrooge. He wasn’t an unlikable fellow; jolly and cheerful at any glance, his smile could light up the darkness in anyone’s life. Yet, when the winter months arrived, and a chilled wind blew across the land, so too did a fell gust freeze his heart. It was time to figure out why his systems were hacked (again), and he knew it would be an expensive endeavor. How he hated managing his IT.

Continue reading
0 Comments

The PC on Haunted Hill

b2ap3_thumbnail_pc_on_haunted_hill_400.jpgOur minds often attribute unexplained phenomena with hauntings from ghosts. Most of the time, there's a perfectly good scientific explanation for what's going on. If you ever see your computer's cursor move on its own, your PC isn't haunted. Although, you might prefer a haunting to what's really happening; a hacker is probably stealing your data. Now that's scary!

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Cloud Internet Microsoft Software Business Computing Google Business Management Hackers Efficiency Productivity Hosted Solutions User Tips Innovation Backup Managed Service Provider Malware Business Workplace Tips Mobile Devices IT Services Computer Hardware windows Upgrade Network Security Communication IT Support Miscellaneous Saving Money Email Productivity Smartphones Data Virtualization Windows 10 Gadgets Smartphone Business Continuity Apps VoIP Disaster Recovery Server Browser Mobile Device Management Microsoft Office Small Business Network Social Media Information Technology Tech Term Mobile Computing Quick Tips Passwords Health Android Cybersecurity Data Backup Holiday Going Green Operating System Mobile Office Chrome Save Money Windows 10 Office 365 Collaboration spam Outsourced IT App Cybercrime Alert Best Practice communications Application Office Users Employer-Employee Relationship Law Enforcement BYOD Managed IT Services Marketing Data Security Search Data Recovery Internet of Things Ransomware Apple Vendor Management WiFi Bring Your Own Device Remote Computing Tablet The Internet of Things Facebook Wearable Technology Mobility History Avoiding Downtime iPhone IT Support Money Router Risk Management Wireless Technology Hacking Cost Management BDR Maintenance Phishing Saving Time User Error Remote Monitoring Antivirus Unified Threat Management Automation IT Solutions Tech Support Office Tips Big Data Hard Drives Password Cloud Computing Encryption Data Management Computers OneNote Government Social Telephone Systems Bandwidth Customer Relationship Management Budget VPN Humor Phone System Website Net Neutrality Wireless Two-factor Authentication Printer Update Unsupported Software Outlook Gmail Wi-Fi USB Information Vulnerability Shortcut PowerPoint Analytics Social Networking Proactive IT Firewall Networking Google Drive Lithium-ion battery Artificial Intelligence Current Events Content Filtering Entertainment Disaster Personal Information Recovery Applications Identity Theft Managed IT Services Education Television Retail Work/Life Balance Blockchain Excel IT COnsultant Mobile Device Politics Computer Repair Meetings Travel Streaming Media Trending Virus Audit Social Engineering Intranet administration Laptop Managed IT Augmented Reality Samsung Battery Business Technology Sports Point of Sale Printer Server Benefits eWaste Wireless Charging Computer Accessories Automobile Mobile Security Programming Cleaning Twitter Windows 8 Value SaaS Data Breach Project Management Cortana Save Time Display Hybrid Cloud HaaS Evernote Computer Care Amazon Paperless Office Managing Stress hacker Storage Fax Server Computing Legal Transportation Commerce End of Support Hosted Solution Data Protection Flexibility Word Business Intelligence Google Assistant Conferencing Telephony Customer Service IT Management Biometrics Data Storage Scam Access Control Managed Service Private Cloud Devices Virtual Reality Online Currency HIPAA Uninterrupted Power Supply Sales Hard Drive Internet Exlporer Patch Management WannaCry Human Resources DDoS Emails Fraud Touchscreen Instant Messaging Google Docs Gamification Intrantet Distributed Denial of Service Charger Compliance Payroll Edge Webinar Bloatware App store Nanotechnology Microsoft Excel Safety Blogging Operating Sysytem Tutorial Memory Training Inbound Marketing Adobe Security Cameras Debate Testing Help Desk Files Ciminal IT solutions Root Cause Analysis Branding File Sharing Financial Company Culture Mouse Machine Learning Co-managed IT Camera Chromecast Windows 10s Identity WIndows 7 Reputation Network Congestion Licensing Downtime Worker Commute Regulations Administrator Projects IT budget Solid State Drive Data Privacy Settings OneDrive Bluetooth Legislation Keyboard Print Server Lifestyle junk Virtual Assistant Workers Video Games Tablets E-Commerce Cameras Access Windows 7 Hard Disk Drive Chromebook SharePoint Comparison Hiring/Firing Ebay User filter Alexa for Business Updates HBO Virtual Desktop NFL Payment Cards Presentation Co-Managed Services Identities Printing Teamwork Specifications Smart Technology Best Available Microsoft Word Science Employee Robot Telephone Language Advertising Nokia Scalability Gift Giving Software as a Service Device Security 3D Printing iOS Buisness Windows Ink Break/Fix Experience Data storage Surge Protector Youtube Hyperlink Computer Forensics Running Cable Gifts PDF How To Microblogging Upgrades WIndows Server 2008 Computer Fan Google Maps Medical IT Music Near Field Communication Wasting Time Proactive Management Screen Mirroring Credit Cards Employer Employee Relationship Text Messaging Admin Vendor Spyware Consultant Data Loss Books IT consulting Touchpad Accessory Websites Wireless Internet Cast FAQ Keyboard Shortcuts Black Market Community Webinar Employee-Employer Relationship Images Sync Monitors ISP Electronic Medical Records Reliable Computing Peripheral Data Theft