Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Mobile Device Management Builds Mobile Reliability

Mobile Device Management Builds Mobile Reliability

Even if you try to ban them in the office, it’s inevitable that your employees will bring their mobile devices to the workplace anyway. Instead of worrying about them wasting away the day, why not try to turn the devices to your advantage? There are more tools out there than ever before to not only add smartphones to your workflows, but to make them profitable and valuable for your organization.

Continue reading
0 Comments

Tip of the Week: Awareness is Key to Mobile Device Security

Tip of the Week: Awareness is Key to Mobile Device Security

With more and more businesses relying on mobile devices for their business they have to be sure that the use of these devices doesn’t present security issues for the company. With all that is happening in business computing today, finding out how you can protect yourself in lieu of the prevalence smartphones play in the business world is important. Here are a few tips on how to lock it up or lose it, altogether.

Continue reading
0 Comments

Google Pixel Is First to Come with Zero-Touch Provisioning--Will Your Favorite Be Next?

Google Pixel Is First to Come with Zero-Touch Provisioning--Will Your Favorite Be Next?

Does your business use Google’s line of Android devices for business purposes? Well, you might be happy to hear about Google’s new zero-touch solution for enterprises for their Pixel line of smartphones. If you provide smartphones for your business’ employees, you know how much of a hassle it is to set up these devices. This new zero-touch policy attempts to make a change to this.

Continue reading
0 Comments

Your Business Needs To Manage Mobile Devices For The Sake Of Its Security

Your Business Needs To Manage Mobile Devices For The Sake Of Its Security

Businesses can benefit from the use of personal mobile devices in the workplace, yet there are also potential dangers in allowing mobile and Internet of Things devices to access your network. In order to reduce these dangers, you need to put some limits and guidelines on the use of such devices in the workplace.

Continue reading
0 Comments

Keep Bring Your Own Device From Becoming Bring Your Own Disaster

Keep Bring Your Own Device From Becoming Bring Your Own Disaster

Do you let your employees bring their own devices in for use on your company network or Wi-Fi connection? If so, we’re sure that they love the freedom that you provide for them, but we must warn you of the dangers that this can bring to an otherwise careful business. We’ll discuss some of the benefits, as well as the pitfalls, of allowing your employees to use personal devices in the workplace.

Continue reading
0 Comments

Tip of the Week: 3 Bluetooth Gadgets for Enhanced Productivity On Mobile Devices

b2ap3_thumbnail_mobile_device_productivity_400.jpgIf you’ve ever tried to work while out of the office on your smartphone or tablet, you’ll have realized that mobile devices aren’t the optimal productivity machine to get the most quality work done. However, if you take advantage of the proper gadgets, you can take back your productivity and continue to get work done, even under the worst circumstances.

Continue reading
0 Comments

Tip of the Week: 4 Immediate Actions to Take After Your Mobile Device Has Been Stolen

b2ap3_thumbnail_lost_device_400.jpgThieves stealing mobile devices like laptops and smartphones have reached epidemic proportions. In fact, 2013 statistics from Consumer Reports and LoJack show that two million laptops were stolen that year, along with three million handsets. Translation; it’s way more likely for your mobile device to be stolen than you probably realize.

Continue reading
0 Comments

How to Handle an Employee that Wants to Use their Smartphone at Work

b2ap3_thumbnail_bring_your_own_device_400.jpgRecently, we’ve been approached by clients asking us about an employee wanting to set up their company email on their iPhone. The business owner thought, “Hey, that’s great! They’re getting more work done and I don’t need to pay for the phone or the service.” We then brought up a crucial point: “What happens when your employee leaves the company or loses their smartphone?”

Continue reading
0 Comments

Do Mobile Devices Sweeten Sales, or Crush Employee Productivity?

b2ap3_thumbnail_smartphone_questions_400.jpgWe’re all aware of how the proliferation of mobile devices is changing the workplace, but let’s take an objective look at this trend. Are mobile devices changing the workplace for the better? Are employees actually using their personal devices to get more work done? Or, is the BYOD trend a bunch of hype and nothing’s really changed? Let’s find out.

Continue reading
0 Comments

Tip of the Week: How to Remotely Wipe Your iPhone or iPad

b2ap3_thumbnail_wipe_clean_ios_400.jpgWith the new iPhone 6 release just a few short weeks ago, many users are excited to ditch their old devices and get the flexible new piece of hardware. Unfortunately, these users might not take into account that their phones could potentially hold private information which should be deleted before forking over the device.

Continue reading
0 Comments

6 Bring Your Own Device Tips to Help Bring the Business

b2ap3_thumbnail_bring_your_own_for_work_400.jpgDoing business in today's world is dependant on mobility, and if you aren't ready to shift toward this new technology trend, you should seriously reconsider. A lot of the time, businesses will allow their employees to bring in their own mobile devices for use in the workplace. This trend is called a Bring Your Own Device (BYOD).

Continue reading
0 Comments

Old Devices Can Compromise Security

b2ap3_thumbnail_device_security_400.jpgAs a responsible business owner, you know that using the latest technology and running updated software is a key component to your company's network security. However, your employees may not value the latest tech like you do, which could result in a major data breach, despite your best efforts to keep your company current.

Recent comment in this post
BOGNA Cook
I tried out the new edu birdie and i have to say the way that it was promoted it didnt much offer that in return it was quiet a di... Read More
Thursday, 12 July 2018 16:14
Continue reading
1 Comment

Don’t Overlook the Mobile Devices Accessing Your Network

b2ap3_thumbnail_mobile_overlooked_400.jpgThe number of employees using their personal devices for work purposes (BYOD) continues to increase rapidly. According to Juniper Research, BYOD will account for over one-third of all mobile devices being used within the next few years. Not adjusting procedures to accommodate for this trend can leave your company's sensitive information vulnerable.

Continue reading
0 Comments

2 of the Biggest Risks Associated with BYOD

b2ap3_thumbnail_bring_your_own_device_policy_400.jpgOne of the most popular business technology trends that we're seeing is employees bringing their own devices into the workplace (BYOD). This trend is due to the popularity of mobile devices (owned by over half of all U.S. adults). While this trend benefits companies in many ways like enhancing mobility, implementing BYOD for a business is not without risks.

Continue reading
0 Comments

Smartphones and Human Productivity Part 2/2: Awareness

b2ap3_thumbnail_can_smartphones_work_for_you_400.jpgMobile devices are changing the technology landscape in the modern office. What kind of changes are smartphones specifically having on human productivity? We are looking at this question in two parts. In our last blog article we looked at how mobile devices impact networking. In part two, we will take a look at smartphones and human awareness.

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

SecurityTip of the WeekTechnologyBest PracticesPrivacyCloudInternetMicrosoftSoftwareBusiness ComputingGoogleBusiness ManagementHackersEfficiencyProductivityHosted SolutionsUser TipsBackupInnovationManaged Service ProviderWorkplace TipsMalwareBusinessIT ServicesMobile DevicesComputerHardwarewindowsUpgradeNetwork SecurityMiscellaneousSaving MoneyEmailCommunicationIT SupportProductivityDataVirtualizationSmartphonesGadgetsWindows 10AppsBusiness ContinuitySmartphoneDisaster RecoveryBrowserVoIPServerSmall BusinessNetworkMicrosoft OfficeMobile Device ManagementTech TermSocial MediaMobile ComputingInformation TechnologyHealthAndroidQuick TipsPasswordsCybersecurityHolidayOperating SystemData BackupMobile OfficeGoing GreenSave MoneyWindows 10Office 365ChromeOutsourced ITCybercrimecommunicationsAppApplicationOfficeAlertBest PracticeCollaborationspamManaged IT ServicesSearchData RecoveryUsersInternet of ThingsRansomwareEmployer-Employee RelationshipData SecurityBYODLaw EnforcementMarketingRemote ComputingTabletWearable TechnologyThe Internet of ThingsAppleFacebookVendor ManagementWiFiBring Your Own DeviceRisk ManagementCost ManagementMoneyIT SupportHackingMaintenanceSaving TimeRouterWireless TechnologyPhishingBDRHistoryUser ErrorRemote MonitoringMobilityUnified Threat ManagementAntivirusAvoiding DowntimeiPhoneHard DrivesOffice TipsPasswordIT SolutionsCloud ComputingTech SupportBig DataData ManagementComputersEncryptionSocialTelephone SystemsCustomer Relationship ManagementOneNoteGovernmentBandwidthAutomationTwo-factor AuthenticationInformationHumorWebsiteNet NeutralityUpdateUnsupported SoftwareSocial NetworkingPrinterWi-FiShortcutOutlookVulnerabilityGmailUSBNetworkingPowerPointAnalyticsGoogle DriveProactive ITFirewallArtificial IntelligenceBudgetLithium-ion batteryCurrent EventsPhone SystemWirelessVPNManaged IT ServicesIT COnsultantTelevisionEducationComputer RepairWork/Life BalanceRetailExcelMobile DeviceMeetingsTravelPoliticsVirusadministrationSocial EngineeringStreaming MediaDisasterApplicationsTrendingAuditManaged ITEntertainmentIntranetRecoveryAugmented RealityPersonal InformationLaptopBlockchainContent FilteringIdentity TheftSave TimeData ProtectionTwitterComputer CareWordProgrammingManaging StressGoogle AssistantConferencingStoragehackerIT ManagementDisplayAmazonManaged ServicePaperless OfficeDevicesLegalHosted SolutionTransportationEnd of SupportBusiness IntelligenceFax ServerCommercePatch ManagementFlexibilityComputingTelephonyCustomer ServiceBiometricsFraudSalesGoogle DocsHard DriveUninterrupted Power SupplyPrivate CloudVirtual RealityBusiness TechnologyData StorageScamHIPAAWireless ChargingInternet ExlporerHuman ResourcesAccess ControlMobile SecurityDDoSInstant MessagingEmailsWannaCryData BreachProject ManagementOnline CurrencyTouchscreenCortanaHybrid CloudWindows 8EvernoteSportsSamsungBenefitseWasteBatteryComputer AccessoriesValueSaaSAutomobilePoint of SaleCleaningPrinter ServerHaaSReputationRegulationsMicrosoft WordBluetoothTelephoneLanguageMachine LearningjunkSolid State DriveWorker CommuteAdministratorCamerasSoftware as a ServiceCo-managed ITSettingsDevice SecurityKeyboardWindows InkSharePointVideo GamesUserHyperlinkDowntimefilterComputer ForensicsHard Disk DriveGiftsAccessVirtual DesktopPresentationNokiaHiring/FiringWIndows Server 2008Print ServerGoogle MapsTeamworkOneDriveBest AvailableWasting TimeGift GivingProactiveE-CommerceManagementYoutubeCredit CardsScienceVendorSpywareSmart TechnologyPayment CardsMicrobloggingData LossAccessoryEbayWebsitesWireless InternetFAQRobotBuisnessAdvertisingEmployee-Employer RelationshipSyncData TheftEmployeeRunning CableScalabilityPeripheralGamificationiOSChargerExperienceData storagePDFNear Field CommunicationEdgeApp storeBreak/FixWebinarUpgradesMicrosoft ExcelImagesHow To3D PrintingMemoryComputer FanMusicEmployer Employee RelationshipAdobeText MessagingIT consultingTestingScreen MirroringCiminalSurge ProtectorMedical ITConsultantFile SharingTouchpadFinancialBooksReliable ComputingCameraCastAdminComplianceIdentityDebateHelp DeskDistributed Denial of ServiceBlack MarketBloatwareMonitorsElectronic Medical RecordsLicensingProjectsIT budgetKeyboard ShortcutsInbound MarketingData PrivacyWebinarLegislationOperating SysytemVirtual AssistantCommunityNanotechnologyWorkersFilesSafetyTrainingTabletsBrandingISPWindows 7PayrollChromebookIT solutionsComparisonIntrantetMouseAlexa for BusinessRoot Cause AnalysisUpdatesChromecastHBOTutorialCompany CultureNFLWIndows 7Co-Managed ServicesLifestyleBloggingIdentitiesSecurity CamerasPrintingWindows 10sSpecificationsNetwork Congestion