Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Credit Card Theft and Identity Theft are Not the Same Thing

Credit Card Theft and Identity Theft are Not the Same Thing

While many might see having a credit card stolen as identity theft, this is an oversimplification that can prove dangerous. While credit card theft can be an element of identity theft, equating the two means that other forms of identity theft are overlooked. In today’s blog, we’ll go over why identity theft and credit card theft aren’t exactly the same thing, and what you can do to help keep your business safe from damage.

Continue reading
0 Comments

Tip of the Week: Protecting Against Identity Theft in the Workplace is as Easy as Following These Tips

Tip of the Week: Protecting Against Identity Theft in the Workplace is as Easy as Following These Tips

On average, how many people do you think are affected by identity theft? According to the United States Bureau of Justice, about five percent of its population; about 11.7 million people, are victims of identity theft. Their methods might vary, but the one thing that all victims have in common is that they hold information that presents value to hackers. Among these victims could be a few that hit close to home: your employees.

Continue reading
0 Comments

Alert: Even Chip-Based Cards Can’t Protect You From This New ATM Scam

Alert: Even Chip-Based Cards Can’t Protect You From This New ATM Scam

If we told you that automated teller machines, or ATMs, were susceptible to hacking attacks, would you believe us? You should; there are a plethora of ways for hackers to infiltrate and steal money from ATMs, with the latest being so dangerous that even the Secret Service has issued warnings about it.

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

SecurityTip of the WeekTechnologyBest PracticesPrivacyInternetCloudMicrosoftBusiness ComputingSoftwareHackersGoogleEfficiencyBusiness ManagementInnovationHosted SolutionsProductivityBackupWorkplace TipsUser TipsManaged Service ProviderMalwareMobile DevicesBusinessNetwork SecurityIT ServicesHardwareComputerUpgradeProductivitywindowsCommunicationEmailDataGadgetsSmartphonesIT SupportMiscellaneousSaving MoneyVirtualizationSmartphoneAppsWindows 10NetworkDisaster RecoveryBusiness ContinuitySmall BusinessVoIPServerBrowserMobile Device ManagementMicrosoft OfficeSocial MediaTech TermInformation TechnologyHealthAndroidMobile ComputingQuick TipsPasswordsCybersecurityMobile OfficeHolidayWindows 10Operating SystemGoing GreenData BackupOffice 365Save MoneyChromeData RecoverycommunicationsOfficeCollaborationspamUsersBYODOutsourced ITCybercrimeAppApplicationInternet of ThingsAlertBest PracticeEmployer-Employee RelationshipLaw EnforcementManaged IT ServicesIT SupportMarketingSearchRansomwareData SecurityWirelessAppleVendor ManagementWiFiRemote ComputingBring Your Own DevicePhishingThe Internet of ThingsTabletFacebookWearable TechnologyAvoiding DowntimeAutomationHistoryMoneyHackingRouteriPhoneWireless TechnologyBDRRisk ManagementCost ManagementUser ErrorRemote MonitoringMaintenanceMobilitySaving TimeUnified Threat ManagementAntivirusCustomer Relationship ManagementOffice TipsPasswordIT SolutionsCloud ComputingTech SupportBig DataData ManagementComputersEncryptionSocialHard DrivesTelephone SystemsOneNoteGovernmentArtificial IntelligenceBandwidthVPNTwo-factor AuthenticationInformationHumorManaged IT ServicesWebsiteNet NeutralityUpdateUnsupported SoftwareEducationPrinterWi-FiShortcutOutlookVulnerabilityGmailUSBNetworkingPowerPointAnalyticsGoogle DriveProactive ITFirewallSocial NetworkingBudgetLithium-ion batteryCurrent EventsPhone SystemContent FilteringadministrationIdentity TheftWordDisasterTelevisionWork/Life BalanceRetailExcelManaged ServicePaperless OfficeMobile DeviceMeetingsTravelTelephonyPoliticsSocial EngineeringIT COnsultantComputer RepairStreaming MediaTrendingApplicationsAuditEntertainmentManaged ITBatteryIntranetVirusRecoveryPersonal InformationLaptopBlockchainAugmented RealitySaaSAutomobileValuePoint of SaleCleaningPrinter ServerPrintingHaaSAccess ControlSave TimeData ProtectionComputer CareProgrammingManaging StressTwitterGoogle AssistantConferencingStoragehackerIT ManagementDisplayAmazonWindows 8DevicesLegalOneDriveHosted SolutionTransportationEnd of SupportBusiness IntelligenceFax ServerCommercePatch ManagementFlexibilityComputingCustomer ServiceBiometricsFraudGoogle DocsPrivate CloudVirtual RealityBusiness TechnologyData StorageScamHIPAAWireless ChargingInternet ExlporerHuman ResourcesFile SharingDDoSMobile SecurityEmailsWannaCryData BreachInstant MessagingProject ManagementYoutubeTouchscreenCortanaOnline CurrencyHybrid CloudEvernoteSportsBenefitsSamsungeWasteComputer AccessoriesHard DriveUninterrupted Power SupplySalesChromebookROIIT solutionsComparisonIntrantetMouseAlexa for BusinessRoot Cause AnalysisUpdatesChromecastHBOCompany CultureNFLImagesWIndows 7Co-Managed ServicesBloggingIdentitiesWebinarBreak/FixTutorialWindows 10sSpecificationsNetwork CongestionReputationRegulationsMicrosoft WordBluetoothTelephoneLanguageMedical ITjunkSolid State DriveWorker CommuteAdministratorCamerasSoftware as a ServiceCo-managed ITSettingsDevice SecurityAdminKeyboardWindows InkHelp DeskSharePointVideo GamesUserHyperlinkDebate5GfilterComputer ForensicsHard Disk DriveGiftsAccessVirtual DesktopPresentationKeyboard ShortcutsHiring/FiringWIndows Server 2008Print ServerGoogle MapsTeamworkBest AvailableWasting TimeProactiveEmployeesManagementCredit CardsScienceVendorSpywarePayrollSmart TechnologyData LossAccessoryEbayWebsitesVoice over Internet ProtocolWireless InternetFAQRobotBuisnessAdvertisingEmployee-Employer RelationshipLifestyleSecurity CamerasSyncSabotageRunning CableScalabilityPeripheralData TheftGamificationiOSChargerExperienceData storagePDFNear Field CommunicationEdgeMachine LearningPCUpgradesMicrosoft ExcelHow ToApp store3D PrintingMemoryComputer FanMusicText MessagingIT consultingTestingScreen MirroringCiminalDowntimeSurge ProtectorEmployer Employee RelationshipAdobeSmartwatchConsultantFinancialNokiaBooksTouchpadReliable ComputingCameraGift GivingCastE-CommerceIdentityServer MaintenanceDistributed Denial of ServiceBlack MarketComplianceMonitorsElectronic Medical RecordsBloatwareLicensingProjectsIT budgetMicrobloggingPayment CardsData PrivacyInvestmentWebinarLegislationInbound MarketingVirtual AssistantCommunityNanotechnologyWorkersFilesSafetyOperating SysytemTrainingTabletsBrandingISPWindows 7Employee