Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Know Your Technology: Computer Forensics

Know Your Technology: Computer Forensics

Have you ever wondered where the commonly accepted perception of cyber investigations comes from? You might be surprised to find out that the world of suits, ties, and data terminals is far from the reality of what these investigations are--or, at least, considerably more dramatic. For today’s tech term, we’re going to get to the bottom of this by investigating what computer forensics really looks like.

Continue reading
0 Comments

How the CLOUD Act Will Affect Your Security

How the CLOUD Act Will Affect Your Security

On March 23rd, 2018, the United States Congress passed another spending bill that could potentially limit individual privacy protection all over the world. This bill included a provision called the Clarifying Lawful Overseas Use of Data (or CLOUD) Act, which makes changes to the Stored Communications Act of 1986 and provides unelected American officials a considerable amount of power over digital privacy rights.

Continue reading
0 Comments

The Federal Bureau of Investigation Has Some Valuable Cybersecurity Tips

The Federal Bureau of Investigation Has Some Valuable Cybersecurity Tips

In February of 2016, President Barack Obama passed a Cybersecurity National Action Plan. The plan implemented near-term actions and developed a long-term strategy to enhance cybersecurity awareness and protections, protect privacy, and maintain public safety. Taking action against cybersecurity now will assist with ensuring economic and national security, as well as empowering Americans to take better control of their digital security.

Recent comment in this post
Octavius Craig
Federal bureau of the investigation is making good names for the arrest of the culprits. All the issues of the https://ukessaysrev... Read More
Monday, 13 August 2018 07:08
Continue reading
1 Comment

Cops Lock Up Criminals, Ransomware Locks Up Cops

Cops Lock Up Criminals, Ransomware Locks Up Cops

Society relies on law enforcement to enforce laws in a fair and just manner, but even the police have their work cut out for them when they are targeted by a cyberattack. A recent incident in Cockrell, Texas shows that not even the police are immune to the threats of ransomware--particularly the emerging brand of ransomware, Osiris.

Continue reading
0 Comments

Why Hackers Want You to Vote in the Upcoming Election

Why Hackers Want You to Vote in the Upcoming Election

Tomorrow is the big day--the day when the American people cast their votes for the next President of the United States. While there may still be a few undecided voters out there, something that they may not be considering includes the machines that they will be using to cast their ballots. It turns out that there may be a major problem with some voting systems in the form of weak cyber security.

Continue reading
0 Comments

FBI Director Insists Government Can Access Any Private Record

FBI Director Insists Government Can Access Any Private Record

Does the U.S. Constitution allow the American government to access the electronic devices of its citizens? According to FBI Director James Comey’s statements at Symantec’s Annual Government Symposium, it certainly does.

Continue reading
0 Comments

Couple Exploits Vulnerability With IRS Filing System, Steals $1M, Goes to Jail

Couple Exploits Vulnerability With IRS Filing System, Steals $1M, Goes to Jail

The Internal Revenue Service is one organization that you don’t want to mess with. Thanks to their antics filing fraudulent tax returns through the often-exploited Get Transcript site managed by the IRS, Anthony and Sonia Alika have to do some time in the slammer; and that’s not even mentioning what they have to pay the IRS in restitution.

Continue reading
0 Comments

Is the Reform of ECPA Enough to Prevent the Government From Reading Your Emails?

Is the Reform of ECPA Enough to Prevent the Government From Reading Your Emails?

How private are your emails and other digital communications? Can the government go through your digital files without you knowing about it? As you may have suspected, they can, thanks to a loophole in an outdated law--a loophole that U.S. lawmakers are trying to close.

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

SecurityTip of the WeekTechnologyBest PracticesPrivacyInternetCloudMicrosoftSoftwareBusiness ComputingBusiness ManagementEfficiencyHackersGoogleProductivityHosted SolutionsBackupUser TipsManaged Service ProviderInnovationMalwareBusinessWorkplace TipsMobile DevicesHardwarewindowsIT ServicesComputerUpgradeNetwork SecurityIT SupportSaving MoneyMiscellaneousEmailDataWindows 10VirtualizationSmartphonesAppsSmartphoneGadgetsBusiness ContinuityCommunicationProductivityDisaster RecoveryVoIPServerBrowserNetworkMobile Device ManagementMicrosoft OfficeMobile ComputingSmall BusinessTech TermInformation TechnologyQuick TipsPasswordsAndroidHealthSocial MediaCybersecurityMobile OfficeHolidayData BackupGoing GreenOperating SystemChromeOffice 365ApplicationOfficeAppAlertBest PracticespamCollaborationSave MoneyCybercrimecommunicationsMarketingRansomwareEmployer-Employee RelationshipData SecurityLaw EnforcementManaged IT ServicesWindows 10Data RecoveryOutsourced ITBYODInternet of ThingsThe Internet of ThingsTabletSearchWearable TechnologyAppleUsersVendor ManagementWiFiRemote ComputingRouteriPhoneWireless TechnologyBDRRisk ManagementMobilityCost ManagementFacebookUser ErrorRemote MonitoringMaintenanceSaving TimeUnified Threat ManagementAntivirusAvoiding DowntimeMoneyHistoryIT SupportHackingBring Your Own DevicePhishingEncryptionHard DrivesOneNoteGovernmentBandwidthOffice TipsCustomer Relationship ManagementPasswordData ManagementComputersIT SolutionsSocialTech SupportTelephone SystemsBig DataGmailUSBArtificial IntelligencePowerPointAnalyticsBudgetProactive ITPhone SystemFirewallSocial NetworkingAutomationWirelessLithium-ion batteryCurrent EventsTwo-factor AuthenticationUpdateUnsupported SoftwareVPNHumorCloud ComputingWebsiteWi-FiNet NeutralityShortcutVulnerabilityPrinterNetworkingOutlookGoogle DriveApplicationsIT COnsultantManaged ITStreaming MediaComputer RepairRecoveryPersonal InformationBlockchainTrendingAuditIdentity TheftIntranetInformationVirusManaged IT ServicesLaptopAugmented RealityContent FilteringadministrationWork/Life BalanceExcelDisasterMobile DeviceEducationTelevisionTravelPoliticsRetailSocial EngineeringHuman ResourcesAccess ControlDDoSMobile SecurityEmailsWannaCryData BreachInstant MessagingProject ManagementTouchscreenCortanaEntertainmentEvernoteSportsBenefitsSamsungeWasteBatteryComputer AccessoriesSaaSAutomobileOnline CurrencyValueCleaningHaaSSave TimeData ProtectionComputer CareWordManaging StressUninterrupted Power SupplySalesHard DriveGoogle AssistantStoragehackerPoint of SalePrinter ServerManaged ServiceDevicesLegalProgrammingTwitterHosted SolutionTransportationEnd of SupportBusiness IntelligenceCommercePatch ManagementMeetingsFlexibilityDisplayWindows 8TelephonyCustomer ServiceAmazonBiometricsPaperless OfficeFraudGoogle DocsPrivate CloudVirtual RealityBusiness TechnologyFax ServerData StorageScamHIPAAComputingWireless ChargingInternet ExlporerText MessagingIT consultingLifestyleTestingScreen MirroringCiminalEmployer Employee RelationshipAdobeConsultantFile SharingFinancialBooksTouchpadReliable ComputingCameraCastAdminDistributed Denial of ServiceBlack MarketComplianceIdentity3D PrintingHybrid CloudMonitorsElectronic Medical RecordsBloatwareProjectsIT budgetKeyboard ShortcutsSurge ProtectorLicensingWebinarLegislationInbound MarketingData PrivacyNokiaVirtual AssistantNanotechnologyWorkersFilesSafetyOperating SysytemBrandingGift GivingWindows 7PayrollTrainingTabletsChromebookIT solutionsComparisonMouseYoutubeAlexa for BusinessRoot Cause AnalysisUpdatesChromecastHBONFLWIndows 7Co-Managed ServicesMicrobloggingIdentitiesSecurity CamerasCompany CulturePrintingWindows 10sSpecificationsNetwork CongestionRegulationsCommunityMicrosoft WordReputationBluetoothISPTelephoneLanguageMachine LearningSolid State DriveConferencingWorker CommuteIntrantetAdministratorjunkCamerasSoftware as a ServiceSettingsDevice SecurityKeyboardIT ManagementWindows InkSharePointVideo GamesUserHyperlinkBloggingWebinarTutorialImagesfilterComputer ForensicsHard Disk DriveGiftsAccessVirtual DesktopPresentationHiring/FiringWIndows Server 2008Google MapsTeamworkBest AvailableWasting TimeProactiveManagementCredit CardsScienceVendorCo-managed ITSpywareSmart TechnologyHelp DeskData LossAccessoryDebateWebsitesWireless InternetFAQRobotBuisnessAdvertisingEmployee-Employer RelationshipSyncRunning CableScalabilityOneDrivePeripheralData TheftPrint ServerGamificationiOSChargerExperienceData storagePDFNear Field CommunicationEdgeUpgradesMicrosoft ExcelHow ToEbayApp storeMemoryComputer FanMusic