Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Credit Card Theft and Identity Theft are Not the Same Thing

Credit Card Theft and Identity Theft are Not the Same Thing

While many might see having a credit card stolen as identity theft, this is an oversimplification that can prove dangerous. While credit card theft can be an element of identity theft, equating the two means that other forms of identity theft are overlooked. In today’s blog, we’ll go over why identity theft and credit card theft aren’t exactly the same thing, and what you can do to help keep your business safe from damage.

Continue reading
0 Comments

Tip of the Week: Protecting Against Identity Theft in the Workplace is as Easy as Following These Tips

Tip of the Week: Protecting Against Identity Theft in the Workplace is as Easy as Following These Tips

On average, how many people do you think are affected by identity theft? According to the United States Bureau of Justice, about five percent of its population; about 11.7 million people, are victims of identity theft. Their methods might vary, but the one thing that all victims have in common is that they hold information that presents value to hackers. Among these victims could be a few that hit close to home: your employees.

Continue reading
0 Comments

Alert: Even Chip-Based Cards Can’t Protect You From This New ATM Scam

Alert: Even Chip-Based Cards Can’t Protect You From This New ATM Scam

If we told you that automated teller machines, or ATMs, were susceptible to hacking attacks, would you believe us? You should; there are a plethora of ways for hackers to infiltrate and steal money from ATMs, with the latest being so dangerous that even the Secret Service has issued warnings about it.

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Cloud Internet Microsoft Software Business Computing Google Business Management Hackers Efficiency Productivity Hosted Solutions User Tips Backup Managed Service Provider Innovation Malware Business Workplace Tips Mobile Devices IT Services Computer Hardware windows Upgrade Network Security Communication IT Support Miscellaneous Saving Money Email Productivity Smartphones Data Virtualization Windows 10 Gadgets Business Continuity Apps Smartphone VoIP Disaster Recovery Server Browser Microsoft Office Small Business Network Mobile Device Management Social Media Information Technology Mobile Computing Tech Term Quick Tips Passwords Health Android Cybersecurity Holiday Data Backup Going Green Operating System Mobile Office Save Money Chrome Office 365 Windows 10 Outsourced IT Cybercrime communications App Application Office Alert Best Practice Collaboration spam Users Data Recovery BYOD Marketing Data Security Search Law Enforcement Internet of Things Ransomware Employer-Employee Relationship Managed IT Services Apple Vendor Management WiFi Remote Computing Bring Your Own Device The Internet of Things Tablet Facebook Wearable Technology History Hacking Router iPhone Phishing Wireless Technology BDR Mobility Risk Management Cost Management User Error Remote Monitoring Maintenance Saving Time Antivirus Unified Threat Management IT Support Money Avoiding Downtime Office Tips Password IT Solutions Tech Support Big Data Data Management Computers Encryption Social Hard Drives Telephone Systems OneNote Government Bandwidth Automation Cloud Computing Customer Relationship Management Humor Two-factor Authentication Vulnerability Website Update Net Neutrality Printer Google Drive Outlook Shortcut Artificial Intelligence Gmail USB PowerPoint Networking Analytics Proactive IT Firewall Wireless Social Networking Information Budget Lithium-ion battery Unsupported Software Current Events Phone System Wi-Fi VPN Mobile Device Politics Disaster Education Television Retail Excel Meetings Applications Travel Managed IT Social Engineering IT COnsultant Blockchain Personal Information Streaming Media Computer Repair Identity Theft Trending Managed IT Services Audit Entertainment Intranet Virus Recovery Work/Life Balance Laptop Augmented Reality Content Filtering administration Flexibility Programming Managing Stress Twitter Fraud Storage Google Docs Display Business Technology Data Storage Scam Amazon Windows 8 Paperless Office Wireless Charging Hosted Solution Access Control Business Intelligence Fax Server Mobile Security WannaCry Data Breach Telephony Project Management Customer Service Computing Biometrics Touchscreen Cortana Evernote Hybrid Cloud Private Cloud Virtual Reality Samsung Battery HIPAA Internet Exlporer Automobile Human Resources DDoS Cleaning Instant Messaging Emails Save Time Data Protection Online Currency Sports Computer Care Word Conferencing Google Assistant Benefits eWaste Computer Accessories IT Management hacker Uninterrupted Power Supply Sales Hard Drive Managed Service SaaS Devices Value Legal Point of Sale Printer Server Transportation HaaS Commerce Patch Management End of Support Accessory Websites Payment Cards Data Loss Regulations FAQ Robot Wireless Internet Bluetooth Employee-Employer Relationship Sync junk Advertising Scalability Co-managed IT Peripheral Data Theft Employee Cameras iOS Charger User Experience Data storage Debate Help Desk Gamification SharePoint Edge filter PDF How To App store Break/Fix Virtual Desktop Upgrades Microsoft Excel Presentation Teamwork Computer Fan OneDrive Best Available Music Print Server Memory Testing Screen Mirroring Ciminal Science Employer Employee Relationship Adobe Text Messaging Medical IT Consultant File Sharing Books Ebay Touchpad Financial Camera Cast Admin Black Market Lifestyle Identity Buisness Running Cable Monitors Electronic Medical Records Projects IT budget Keyboard Shortcuts Licensing Near Field Communication Data Privacy Webinar Legislation Nanotechnology Workers Safety Operating Sysytem Virtual Assistant Windows 7 Payroll Training Tablets 3D Printing IT consulting Surge Protector Chromebook IT solutions Comparison Root Cause Analysis Updates HBO Alexa for Business Co-Managed Services Identities Security Cameras Company Culture NFL Nokia Reliable Computing Gift Giving Printing Windows 10s Specifications Distributed Denial of Service Microsoft Word Compliance Reputation Youtube Telephone Language Machine Learning Bloatware Worker Commute Administrator Microblogging Solid State Drive Software as a Service Settings Device Security Keyboard Inbound Marketing Community Hyperlink Files Downtime Windows Ink Video Games Hard Disk Drive Gifts ISP Access Computer Forensics Branding Intrantet Mouse Hiring/Firing WIndows Server 2008 Wasting Time Chromecast Proactive E-Commerce Google Maps Credit Cards WIndows 7 Blogging Webinar Tutorial Images Management Vendor Spyware Network Congestion Smart Technology