Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How to Keep Your Mobile Data Safe

How to Keep Your Mobile Data Safe

Oh no. You slap your pockets in a sudden panic, but you only confirm what you suddenly feared: you’ve lost your mobile device, the one with all of your business data on it. You haven’t an idea where you might have left it - all you know is that it’s just... gone.

Continue reading
0 Comments

What’s the Best Form of Authentication on Your Mobile Device?

What’s the Best Form of Authentication on Your Mobile Device?

As smartphones have become smarter, they have become filled with more and more data that needs to be kept private for the owner’s safety and security. This is why it is fortunate that there are also more ways to secure a smartphone against unauthorized use. We’ll examine the many options to devise which is the most secure.

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

SecurityTip of the WeekTechnologyBest PracticesPrivacyInternetCloudMicrosoftSoftwareBusiness ComputingBusiness ManagementHackersGoogleEfficiencyProductivityHosted SolutionsBackupManaged Service ProviderUser TipsWorkplace TipsMalwareBusinessInnovationMobile DeviceswindowsIT ServicesHardwareComputerUpgradeNetwork SecurityIT SupportSaving MoneyMiscellaneousEmailDataSmartphonesWindows 10VirtualizationBusiness ContinuityGadgetsCommunicationSmartphoneAppsProductivityVoIPDisaster RecoveryNetworkBrowserMicrosoft OfficeServerMobile Device ManagementSmall BusinessTech TermMobile ComputingInformation TechnologyAndroidQuick TipsPasswordsHealthSocial MediaOperating SystemMobile OfficeData BackupGoing GreenCybersecurityHolidayChromeCybercrimecommunicationsAppApplicationOfficeAlertBest PracticeOffice 365CollaborationspamSave MoneyWindows 10Data RecoveryOutsourced ITRansomwareEmployer-Employee RelationshipBYODMarketingData SecurityLaw EnforcementManaged IT ServicesAppleUsersThe Internet of ThingsVendor ManagementWiFiInternet of ThingsTabletSearchRemote ComputingWearable TechnologyRouterPhishingWireless TechnologyMoneyBDRIT SupportHistoryFacebookUser ErrorBring Your Own DeviceRemote MonitoringAntivirusUnified Threat ManagementiPhoneAvoiding DowntimeMobilityRisk ManagementCost ManagementMaintenanceSaving TimeHackingBig DataData ManagementComputersEncryptionSocialCustomer Relationship ManagementTelephone SystemsOneNoteGovernmentBandwidthHard DrivesOffice TipsPasswordIT SolutionsTech SupportUnsupported SoftwareGmailUSBPowerPointCloud ComputingNetworkingAnalyticsWi-FiProactive ITVulnerabilityFirewallBudgetLithium-ion batteryGoogle DriveCurrent EventsPhone SystemArtificial IntelligenceAutomationVPNHumorTwo-factor AuthenticationWebsiteUpdateNet NeutralitySocial NetworkingWirelessPrinterShortcutOutlookVirusTravelWork/Life BalanceadministrationSocial EngineeringMobile DeviceDisasterStreaming MediaPoliticsTrendingAuditIntranetRecoveryLaptopAugmented RealityContent FilteringApplicationsManaged ITIT COnsultantPersonal InformationComputer RepairBlockchainEducationTelevisionRetailExcelIdentity TheftInformationManaged IT ServicesGoogle AssistantMeetingsUninterrupted Power SupplyhackerTelephonySalesCustomer ServiceHard DriveComputingBiometricsPrivate CloudVirtual RealityManaged ServiceDevicesLegalHIPAATransportationEnd of SupportInternet ExlporerCommercePatch ManagementFlexibilityHuman ResourcesDDoSInstant MessagingEmailsFraudGoogle DocsWindows 8Online CurrencyScamSportsBusiness TechnologyEntertainmentData StorageBenefitseWasteComputer AccessoriesWireless ChargingAccess ControlMobile SecuritySaaSValueWannaCryData BreachPoint of SaleProject ManagementPrinter ServerTouchscreenCortanaHaaSEvernoteSamsungProgrammingManaging StressTwitterBatteryStorageDisplayAutomobileAmazonCleaningPaperless OfficeHosted SolutionSave TimeData ProtectionFax ServerComputer CareWordBusiness IntelligenceEbaySolid State DriveConferencingWorker CommuteAdministratorSoftware as a ServiceSettingsDevice SecurityKeyboardIT ManagementWindows InkVideo GamesBuisnessHyperlinkComputer ForensicsHard Disk DriveGiftsAccessRunning CableWebinarImagesHiring/FiringWIndows Server 2008Google MapsWasting TimeNear Field CommunicationProactiveManagementCredit CardsVendor3D PrintingSpywareSmart TechnologyWebsitesData LossSurge ProtectorAccessoryIT consultingWireless InternetFAQRobotSyncAdvertisingDebateEmployee-Employer RelationshipHelp DeskReliable ComputingData TheftScalabilityPeripheralDistributed Denial of ServiceGamificationComplianceiOSChargerExperienceData storagePDFBloatwareEdgeApp storeUpgradesMicrosoft ExcelHow ToMemoryInbound MarketingComputer FanMusicCommunityEmployer Employee RelationshipAdobeText MessagingFilesTestingScreen MirroringCiminalISPConsultantFile SharingBrandingTouchpadIntrantetMouseFinancialBooksLifestyleChromecastCameraCastAdminWIndows 7IdentityBloggingTutorialBlack MarketNetwork CongestionHybrid CloudMonitorsElectronic Medical RecordsLicensingProjectsRegulationsIT budgetKeyboard ShortcutsData PrivacyWebinarLegislationBluetoothOperating SysytemVirtual AssistantjunkNanotechnologyWorkersSafetyCo-managed ITTrainingTabletsWindows 7CamerasPayrollUserChromebookIT solutionsComparisonNokiaSharePointGift GivingAlexa for BusinessfilterRoot Cause AnalysisUpdatesHBOCompany CultureNFLYoutubeVirtual DesktopCo-Managed ServicesPresentationIdentitiesSecurity CamerasOneDriveBest AvailablePrintingWindows 10sSpecificationsPrint ServerTeamworkReputationMicrobloggingScienceMicrosoft WordTelephoneLanguageMachine Learning