Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Mobile Device Management Builds Mobile Reliability

Mobile Device Management Builds Mobile Reliability

Even if you try to ban them in the office, it’s inevitable that your employees will bring their mobile devices to the workplace anyway. Instead of worrying about them wasting away the day, why not try to turn the devices to your advantage? There are more tools out there than ever before to not only add smartphones to your workflows, but to make them profitable and valuable for your organization.

Continue reading
0 Comments

Tip of the Week: Awareness is Key to Mobile Device Security

Tip of the Week: Awareness is Key to Mobile Device Security

With more and more businesses relying on mobile devices for their business they have to be sure that the use of these devices doesn’t present security issues for the company. With all that is happening in business computing today, finding out how you can protect yourself in lieu of the prevalence smartphones play in the business world is important. Here are a few tips on how to lock it up or lose it, altogether.

Continue reading
0 Comments

Google Pixel Is First to Come with Zero-Touch Provisioning--Will Your Favorite Be Next?

Google Pixel Is First to Come with Zero-Touch Provisioning--Will Your Favorite Be Next?

Does your business use Google’s line of Android devices for business purposes? Well, you might be happy to hear about Google’s new zero-touch solution for enterprises for their Pixel line of smartphones. If you provide smartphones for your business’ employees, you know how much of a hassle it is to set up these devices. This new zero-touch policy attempts to make a change to this.

Continue reading
0 Comments

Your Business Needs To Manage Mobile Devices For The Sake Of Its Security

Your Business Needs To Manage Mobile Devices For The Sake Of Its Security

Businesses can benefit from the use of personal mobile devices in the workplace, yet there are also potential dangers in allowing mobile and Internet of Things devices to access your network. In order to reduce these dangers, you need to put some limits and guidelines on the use of such devices in the workplace.

Continue reading
0 Comments

Keep Bring Your Own Device From Becoming Bring Your Own Disaster

Keep Bring Your Own Device From Becoming Bring Your Own Disaster

Do you let your employees bring their own devices in for use on your company network or Wi-Fi connection? If so, we’re sure that they love the freedom that you provide for them, but we must warn you of the dangers that this can bring to an otherwise careful business. We’ll discuss some of the benefits, as well as the pitfalls, of allowing your employees to use personal devices in the workplace.

Continue reading
0 Comments

Tip of the Week: 3 Bluetooth Gadgets for Enhanced Productivity On Mobile Devices

b2ap3_thumbnail_mobile_device_productivity_400.jpgIf you’ve ever tried to work while out of the office on your smartphone or tablet, you’ll have realized that mobile devices aren’t the optimal productivity machine to get the most quality work done. However, if you take advantage of the proper gadgets, you can take back your productivity and continue to get work done, even under the worst circumstances.

Continue reading
0 Comments

Tip of the Week: 4 Immediate Actions to Take After Your Mobile Device Has Been Stolen

b2ap3_thumbnail_lost_device_400.jpgThieves stealing mobile devices like laptops and smartphones have reached epidemic proportions. In fact, 2013 statistics from Consumer Reports and LoJack show that two million laptops were stolen that year, along with three million handsets. Translation; it’s way more likely for your mobile device to be stolen than you probably realize.

Continue reading
0 Comments

How to Handle an Employee that Wants to Use their Smartphone at Work

b2ap3_thumbnail_bring_your_own_device_400.jpgRecently, we’ve been approached by clients asking us about an employee wanting to set up their company email on their iPhone. The business owner thought, “Hey, that’s great! They’re getting more work done and I don’t need to pay for the phone or the service.” We then brought up a crucial point: “What happens when your employee leaves the company or loses their smartphone?”

Continue reading
0 Comments

Do Mobile Devices Sweeten Sales, or Crush Employee Productivity?

b2ap3_thumbnail_smartphone_questions_400.jpgWe’re all aware of how the proliferation of mobile devices is changing the workplace, but let’s take an objective look at this trend. Are mobile devices changing the workplace for the better? Are employees actually using their personal devices to get more work done? Or, is the BYOD trend a bunch of hype and nothing’s really changed? Let’s find out.

Continue reading
0 Comments

Tip of the Week: How to Remotely Wipe Your iPhone or iPad

b2ap3_thumbnail_wipe_clean_ios_400.jpgWith the new iPhone 6 release just a few short weeks ago, many users are excited to ditch their old devices and get the flexible new piece of hardware. Unfortunately, these users might not take into account that their phones could potentially hold private information which should be deleted before forking over the device.

Continue reading
0 Comments

6 Bring Your Own Device Tips to Help Bring the Business

b2ap3_thumbnail_bring_your_own_for_work_400.jpgDoing business in today's world is dependant on mobility, and if you aren't ready to shift toward this new technology trend, you should seriously reconsider. A lot of the time, businesses will allow their employees to bring in their own mobile devices for use in the workplace. This trend is called a Bring Your Own Device (BYOD).

Continue reading
0 Comments

Old Devices Can Compromise Security

b2ap3_thumbnail_device_security_400.jpgAs a responsible business owner, you know that using the latest technology and running updated software is a key component to your company's network security. However, your employees may not value the latest tech like you do, which could result in a major data breach, despite your best efforts to keep your company current.

Recent comment in this post
BOGNA Cook
I tried out the new edu birdie and i have to say the way that it was promoted it didnt much offer that in return it was quiet a di... Read More
Thursday, 12 July 2018 16:14
Continue reading
1 Comment

Don’t Overlook the Mobile Devices Accessing Your Network

b2ap3_thumbnail_mobile_overlooked_400.jpgThe number of employees using their personal devices for work purposes (BYOD) continues to increase rapidly. According to Juniper Research, BYOD will account for over one-third of all mobile devices being used within the next few years. Not adjusting procedures to accommodate for this trend can leave your company's sensitive information vulnerable.

Continue reading
0 Comments

2 of the Biggest Risks Associated with BYOD

b2ap3_thumbnail_bring_your_own_device_policy_400.jpgOne of the most popular business technology trends that we're seeing is employees bringing their own devices into the workplace (BYOD). This trend is due to the popularity of mobile devices (owned by over half of all U.S. adults). While this trend benefits companies in many ways like enhancing mobility, implementing BYOD for a business is not without risks.

Continue reading
0 Comments

Smartphones and Human Productivity Part 2/2: Awareness

b2ap3_thumbnail_can_smartphones_work_for_you_400.jpgMobile devices are changing the technology landscape in the modern office. What kind of changes are smartphones specifically having on human productivity? We are looking at this question in two parts. In our last blog article we looked at how mobile devices impact networking. In part two, we will take a look at smartphones and human awareness.

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

SecurityTip of the WeekTechnologyBest PracticesPrivacyInternetCloudMicrosoftBusiness ComputingSoftwareHackersGoogleEfficiencyBusiness ManagementInnovationProductivityHosted SolutionsBackupUser TipsWorkplace TipsManaged Service ProviderMalwareBusinessMobile DevicesNetwork SecurityProductivityHardwareIT ServicesComputerwindowsUpgradeCommunicationEmailDataIT SupportMiscellaneousSaving MoneyGadgetsSmartphonesVirtualizationAppsWindows 10SmartphoneDisaster RecoveryBusiness ContinuitySmall BusinessNetworkVoIPServerBrowserMicrosoft OfficeMobile Device ManagementInformation TechnologyAndroidHealthTech TermMobile ComputingSocial MediaQuick TipsPasswordsCybersecurityGoing GreenOperating SystemOffice 365Mobile OfficeData BackupWindows 10HolidayData RecoverycommunicationsOfficeSave MoneyChromeOutsourced ITCybercrimeBYODApplicationInternet of ThingsEmployer-Employee RelationshipAppAlertBest PracticespamCollaborationUsersData SecurityMarketingRansomwareSearchLaw EnforcementManaged IT ServicesIT SupportBring Your Own DevicePhishingTabletThe Internet of ThingsFacebookWearable TechnologyWirelessAppleVendor ManagementWiFiRemote ComputingiPhoneRouterWireless TechnologyBDRRisk ManagementMobilityCost ManagementUser ErrorMaintenanceAutomationSaving TimeRemote MonitoringAntivirusUnified Threat ManagementAvoiding DowntimeMoneyHistoryHackingIT SolutionsSocialTelephone SystemsTech SupportBig DataArtificial IntelligenceHard DrivesEncryptionOneNoteGovernmentBandwidthOffice TipsCustomer Relationship ManagementPasswordCloud ComputingData ManagementComputersEducationPrinterNetworkingOutlookGoogle DriveGmailUSBInformationPowerPointBudgetAnalyticsPhone SystemProactive ITSocial NetworkingFirewallLithium-ion batteryManaged IT ServicesTwo-factor AuthenticationCurrent EventsUpdateUnsupported SoftwareVPNHumorWi-FiWebsiteShortcutNet NeutralityVulnerabilityTelevisionRetailPaperless OfficeSocial EngineeringBlockchainIT COnsultantWordEntertainmentManaged ITBatteryComputer RepairRecoveryPersonal InformationStreaming MediaManaged ServiceTrendingAuditIdentity TheftVirusIntranetadministrationLaptopAugmented RealityContent FilteringExcelWork/Life BalanceDisasterMeetingsMobile DeviceTelephonyApplicationsPoliticsTravelBiometricsDisplayCortanaHybrid CloudAmazonEvernotePrivate CloudVirtual RealityOneDriveData StorageScamHIPAAInternet ExlporerFax ServerHuman ResourcesDDoSComputingWannaCryInstant MessagingEmailsPrintingTouchscreenData ProtectionSportsGoogle AssistantConferencingBenefitsAccess ControlSamsungeWasteIT ManagementComputer AccessoriesYoutubeDevicesSaaSAutomobileValueCleaningOnline CurrencyHaaSPatch ManagementSave TimeHard DriveComputer CareManaging StressUninterrupted Power SupplySalesFraudStoragehackerGoogle DocsPoint of SaleBusiness TechnologyPrinter ServerLegalWireless ChargingHosted SolutionTransportationEnd of SupportProgrammingMobile SecurityCommerceFile SharingTwitterBusiness IntelligenceFlexibilityData BreachWindows 8Project ManagementCustomer ServiceAdvertisingIdentityBuisnessRunning CableE-CommerceScalabilityProjectsIT budgetServer MaintenanceiOSLicensingExperienceData storageNear Field CommunicationPDFData PrivacyLegislationPrint ServerWorkersPayment CardsUpgradesHow ToVirtual AssistantWindows 7InvestmentComputer FanTabletsMusicIT consultingText MessagingLifestyleChromebookEbayScreen MirroringComparisonEmployer Employee RelationshipUpdatesEmployeeConsultantHBOAlexa for BusinessCo-Managed ServicesIdentitiesROINFLBooksTouchpadReliable ComputingCastSpecificationsMicrosoft WordDistributed Denial of ServiceBreak/FixBlack MarketComplianceTelephoneLanguageMonitorsBloatwareElectronic Medical RecordsDevice SecurityMedical ITWebinarInbound MarketingSoftware as a Service3D PrintingHyperlinkNokiaFilesNanotechnologyWindows InkSurge ProtectorSafetyOperating SysytemGift GivingComputer ForensicsGiftsBrandingAdminTraining5GIT solutionsWIndows Server 2008MouseWasting TimeProactiveChromecastRoot Cause AnalysisGoogle MapsCompany CultureWIndows 7ManagementMicrobloggingCredit CardsKeyboard ShortcutsSpywareEmployeesWindows 10sNetwork CongestionVendorReputationAccessoryWebsitesData LossRegulationsWireless InternetFAQBluetoothPayrollVoice over Internet ProtocolCommunitySolid State DriveSyncWorker CommutejunkAdministratorEmployee-Employer RelationshipPeripheralISPData TheftSettingsKeyboardCamerasImagesUserVideo GamesIntrantetGamificationWebinarChargerSharePointSecurity CamerasEdgeSabotageHard Disk DrivefilterAccessApp storeBloggingMicrosoft ExcelVirtual DesktopTutorialHiring/FiringPresentationBest AvailableMemoryTeamworkMachine LearningCiminalPCAdobeScienceTestingSmart TechnologyDowntimeHelp DeskFinancialDebateSmartwatchCo-managed ITRobotCamera