Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Know Your Technology: Computer Forensics

Know Your Technology: Computer Forensics

Have you ever wondered where the commonly accepted perception of cyber investigations comes from? You might be surprised to find out that the world of suits, ties, and data terminals is far from the reality of what these investigations are--or, at least, considerably more dramatic. For today’s tech term, we’re going to get to the bottom of this by investigating what computer forensics really looks like.

Continue reading
0 Comments

How the CLOUD Act Will Affect Your Security

How the CLOUD Act Will Affect Your Security

On March 23rd, 2018, the United States Congress passed another spending bill that could potentially limit individual privacy protection all over the world. This bill included a provision called the Clarifying Lawful Overseas Use of Data (or CLOUD) Act, which makes changes to the Stored Communications Act of 1986 and provides unelected American officials a considerable amount of power over digital privacy rights.

Continue reading
0 Comments

The Federal Bureau of Investigation Has Some Valuable Cybersecurity Tips

The Federal Bureau of Investigation Has Some Valuable Cybersecurity Tips

In February of 2016, President Barack Obama passed a Cybersecurity National Action Plan. The plan implemented near-term actions and developed a long-term strategy to enhance cybersecurity awareness and protections, protect privacy, and maintain public safety. Taking action against cybersecurity now will assist with ensuring economic and national security, as well as empowering Americans to take better control of their digital security.

Recent comment in this post
Octavius Craig
Federal bureau of the investigation is making good names for the arrest of the culprits. All the issues of the https://ukessaysrev... Read More
Monday, 13 August 2018 07:08
Continue reading
1 Comment

Cops Lock Up Criminals, Ransomware Locks Up Cops

Cops Lock Up Criminals, Ransomware Locks Up Cops

Society relies on law enforcement to enforce laws in a fair and just manner, but even the police have their work cut out for them when they are targeted by a cyberattack. A recent incident in Cockrell, Texas shows that not even the police are immune to the threats of ransomware--particularly the emerging brand of ransomware, Osiris.

Continue reading
0 Comments

Why Hackers Want You to Vote in the Upcoming Election

Why Hackers Want You to Vote in the Upcoming Election

Tomorrow is the big day--the day when the American people cast their votes for the next President of the United States. While there may still be a few undecided voters out there, something that they may not be considering includes the machines that they will be using to cast their ballots. It turns out that there may be a major problem with some voting systems in the form of weak cyber security.

Continue reading
0 Comments

FBI Director Insists Government Can Access Any Private Record

FBI Director Insists Government Can Access Any Private Record

Does the U.S. Constitution allow the American government to access the electronic devices of its citizens? According to FBI Director James Comey’s statements at Symantec’s Annual Government Symposium, it certainly does.

Continue reading
0 Comments

Couple Exploits Vulnerability With IRS Filing System, Steals $1M, Goes to Jail

Couple Exploits Vulnerability With IRS Filing System, Steals $1M, Goes to Jail

The Internal Revenue Service is one organization that you don’t want to mess with. Thanks to their antics filing fraudulent tax returns through the often-exploited Get Transcript site managed by the IRS, Anthony and Sonia Alika have to do some time in the slammer; and that’s not even mentioning what they have to pay the IRS in restitution.

Continue reading
0 Comments

Is the Reform of ECPA Enough to Prevent the Government From Reading Your Emails?

Is the Reform of ECPA Enough to Prevent the Government From Reading Your Emails?

How private are your emails and other digital communications? Can the government go through your digital files without you knowing about it? As you may have suspected, they can, thanks to a loophole in an outdated law--a loophole that U.S. lawmakers are trying to close.

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

SecurityTip of the WeekTechnologyBest PracticesPrivacyInternetCloudMicrosoftBusiness ComputingSoftwareHackersGoogleEfficiencyBusiness ManagementInnovationHosted SolutionsProductivityBackupWorkplace TipsUser TipsManaged Service ProviderMalwareMobile DevicesBusinessNetwork SecurityIT ServicesHardwareComputerUpgradeProductivitywindowsCommunicationEmailDataGadgetsSmartphonesIT SupportMiscellaneousSaving MoneyVirtualizationSmartphoneAppsWindows 10NetworkDisaster RecoveryBusiness ContinuitySmall BusinessVoIPServerBrowserMobile Device ManagementMicrosoft OfficeSocial MediaTech TermInformation TechnologyHealthAndroidMobile ComputingQuick TipsPasswordsCybersecurityMobile OfficeHolidayWindows 10Operating SystemGoing GreenData BackupOffice 365Save MoneyChromeData RecoverycommunicationsOfficeCollaborationspamUsersBYODOutsourced ITCybercrimeAppApplicationInternet of ThingsAlertBest PracticeEmployer-Employee RelationshipLaw EnforcementManaged IT ServicesIT SupportMarketingSearchRansomwareData SecurityWirelessAppleVendor ManagementWiFiRemote ComputingBring Your Own DevicePhishingThe Internet of ThingsTabletFacebookWearable TechnologyAvoiding DowntimeAutomationHistoryMoneyHackingRouteriPhoneWireless TechnologyBDRRisk ManagementCost ManagementUser ErrorRemote MonitoringMaintenanceMobilitySaving TimeUnified Threat ManagementAntivirusCustomer Relationship ManagementOffice TipsPasswordIT SolutionsCloud ComputingTech SupportBig DataData ManagementComputersEncryptionSocialHard DrivesTelephone SystemsOneNoteGovernmentArtificial IntelligenceBandwidthVPNTwo-factor AuthenticationInformationHumorManaged IT ServicesWebsiteNet NeutralityUpdateUnsupported SoftwareEducationPrinterWi-FiShortcutOutlookVulnerabilityGmailUSBNetworkingPowerPointAnalyticsGoogle DriveProactive ITFirewallSocial NetworkingBudgetLithium-ion batteryCurrent EventsPhone SystemContent FilteringadministrationIdentity TheftWordDisasterTelevisionWork/Life BalanceRetailExcelManaged ServicePaperless OfficeMobile DeviceMeetingsTravelTelephonyPoliticsSocial EngineeringIT COnsultantComputer RepairStreaming MediaTrendingApplicationsAuditEntertainmentManaged ITBatteryIntranetVirusRecoveryPersonal InformationLaptopBlockchainAugmented RealitySaaSAutomobileValuePoint of SaleCleaningPrinter ServerPrintingHaaSAccess ControlSave TimeData ProtectionComputer CareProgrammingManaging StressTwitterGoogle AssistantConferencingStoragehackerIT ManagementDisplayAmazonWindows 8DevicesLegalOneDriveHosted SolutionTransportationEnd of SupportBusiness IntelligenceFax ServerCommercePatch ManagementFlexibilityComputingCustomer ServiceBiometricsFraudGoogle DocsPrivate CloudVirtual RealityBusiness TechnologyData StorageScamHIPAAWireless ChargingInternet ExlporerHuman ResourcesFile SharingDDoSMobile SecurityEmailsWannaCryData BreachInstant MessagingProject ManagementYoutubeTouchscreenCortanaOnline CurrencyHybrid CloudEvernoteSportsBenefitsSamsungeWasteComputer AccessoriesHard DriveUninterrupted Power SupplySalesChromebookROIIT solutionsComparisonIntrantetMouseAlexa for BusinessRoot Cause AnalysisUpdatesChromecastHBOCompany CultureNFLImagesWIndows 7Co-Managed ServicesBloggingIdentitiesWebinarBreak/FixTutorialWindows 10sSpecificationsNetwork CongestionReputationRegulationsMicrosoft WordBluetoothTelephoneLanguageMedical ITjunkSolid State DriveWorker CommuteAdministratorCamerasSoftware as a ServiceCo-managed ITSettingsDevice SecurityAdminKeyboardWindows InkHelp DeskSharePointVideo GamesUserHyperlinkDebate5GfilterComputer ForensicsHard Disk DriveGiftsAccessVirtual DesktopPresentationKeyboard ShortcutsHiring/FiringWIndows Server 2008Print ServerGoogle MapsTeamworkBest AvailableWasting TimeProactiveEmployeesManagementCredit CardsScienceVendorSpywarePayrollSmart TechnologyData LossAccessoryEbayWebsitesVoice over Internet ProtocolWireless InternetFAQRobotBuisnessAdvertisingEmployee-Employer RelationshipLifestyleSecurity CamerasSyncSabotageRunning CableScalabilityPeripheralData TheftGamificationiOSChargerExperienceData storagePDFNear Field CommunicationEdgeMachine LearningPCUpgradesMicrosoft ExcelHow ToApp store3D PrintingMemoryComputer FanMusicText MessagingIT consultingTestingScreen MirroringCiminalDowntimeSurge ProtectorEmployer Employee RelationshipAdobeSmartwatchConsultantFinancialNokiaBooksTouchpadReliable ComputingCameraGift GivingCastE-CommerceIdentityServer MaintenanceDistributed Denial of ServiceBlack MarketComplianceMonitorsElectronic Medical RecordsBloatwareLicensingProjectsIT budgetMicrobloggingPayment CardsData PrivacyInvestmentWebinarLegislationInbound MarketingVirtual AssistantCommunityNanotechnologyWorkersFilesSafetyOperating SysytemTrainingTabletsBrandingISPWindows 7Employee