Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Changing Your Network Profile

Tip of the Week: Changing Your Network Profile

The Windows operating system has different settings for connecting to different networks. While this may seem like a minor detail, it actually can have considerable ramifications to your cybersecurity, not to mention that of your business. For this week’s tip, we’ll discuss how to use your network profile to stay secure, based on your situation.

Continue reading
0 Comments

A Brief Overview of Network Security

A Brief Overview of Network Security

The reliance the modern business has on its IT cannot be understated. As a result, to keep their computing network and infrastructure running efficiently, companies need to have a network and cybersecurity policy in place. With the development and use of organizational computer networks with multiple endpoints, understanding the basics of network security is helpful when implementing and employing network security systems. Today, we take a look at the parts of your network, their functions, and what you need to do to protect them.

Continue reading
0 Comments

Tech Term: Router

Tech Term: Router

The more that people depend on mobile devices and portable computers to get work done, the more businesses have to consider how to manage their organization’s wireless network. The router is the piece of hardware that makes the wireless network possible. Today, we will talk a little bit about the router and how its configuration can dictate the strength, reliability, and security of your business’ wireless network.

Continue reading
0 Comments

You Can’t Afford to Let Your Network Go Unmanaged

You Can’t Afford to Let Your Network Go Unmanaged

While maintaining any system can be a pain, your business can’t afford not to maintain your network. An MSP can help you to do so, delivering the benefits of regular network maintenance.

Continue reading
0 Comments

Tip of the Week: The Easiest Way to Share Files Between 2 PCs

b2ap3_thumbnail_new_home_networking_400.jpgSo you’ve got two personal computers and you need to share a file from one to the other. What’s the best way to go about this? You might be surprised to learn that doing this is as easy as dragging and dropping.

Continue reading
0 Comments

How a Small Bottleneck Issue Can Significantly Hinder Network Performance

b2ap3_thumbnail_bottlenecking_network_400.jpgIf you shell out for brand new office equipment, you’ll naturally expect it to perform better than your older machines. Sometimes the age of your network hardware isn’t the only problem affecting your network’s performance. More often than not, network bottlenecking could be the issue at hand.

Continue reading
0 Comments

3 WiFi Tips To Improve Performance and Troubleshoot Issues

b2ap3_thumbnail_wifi_internet_connection_400.jpgIn the modern business landscape, WiFi is more important than ever before. In recent years, the capabilities of WiFi technology have improved dramatically, prompting more businesses to utilize wireless technology. An increased dependency on WiFi means that a working wireless connection is critical to operations. This requires knowing how to both properly setup and maintain your wireless network.

Continue reading
0 Comments

Tip of the Week: 5 Ways to Extend Your WiFi Signal

b2ap3_thumbnail_wifi_extention_400.jpgToday, having a strong WiFi signal is critical. You need a reliable signal for every part of your home, office, and even outside the building. Is your wireless signal strong in some areas and spotty in others? Would your life be immensely easier if your signal extended for just one or two more rooms? For this week’s tip, here’s how you can extend your WiFi signal.

Continue reading
0 Comments

How Will Future Technologies Change Two-Factor Authentication?

b2ap3_thumbnail_two_factor_authentication_400.jpgIn these times, passwords are losing their effectiveness. Hackers can now input millions of passwords every second to crack your code. Even now, professionals are working on new solutions which can jumpstart online security. While using a password is still an ideal choice, there are plenty of other options that are being discussed in the two-factor authentication field.

Continue reading
0 Comments

It’s Imperative that You Use Correct KVM Switches

b2ap3_thumbnail_kvm_switch_400.jpgYour company's IT infrastructure is much like a puzzle. There are many different pieces that make it up, and each piece is needed for the entire network to work properly. One piece of equipment that often gets overlooked is the KVM switch. Here are three tips on finding the right KVM for your business.

Continue reading
0 Comments

“Zero Trust” Network Security: Only Trust Data as Far as You Can Throw It!

b2ap3_thumbnail_zero_trust_400.jpgWhen it feels like everybody is out to get you, there's only one way to survive: Trust nobody. You may not have too many physical enemies ready to jump you, but there's an army of hackers wanting to breach your company's database. One of the securest ways to keep your company's information safe is to implement a "zero trust" network security model.

Continue reading
0 Comments

au·dit/ noun/: a systematic review or assessment of something

b2ap3_thumbnail_it_audit_400.jpgAre you confident that your company's network is 100 percent secure? The best way to answer "yes" to this question is with a network audit. This is a technical procedure where IT professionals analyze every nook and cranny of your system, looking for every possible vulnerability. No matter what the situation is with your company's IT management, a network audit is worth doing.

Continue reading
0 Comments

Don’t Overlook the Mobile Devices Accessing Your Network

b2ap3_thumbnail_mobile_overlooked_400.jpgThe number of employees using their personal devices for work purposes (BYOD) continues to increase rapidly. According to Juniper Research, BYOD will account for over one-third of all mobile devices being used within the next few years. Not adjusting procedures to accommodate for this trend can leave your company's sensitive information vulnerable.

Continue reading
0 Comments

Adding a Computer Network to Your Startup Business

b2ap3_thumbnail_computer_network400.jpgOne of the most significant signs that a small startup company is on its way to becoming a mid-sized business is when operations require more than one workstation. Whenever the founder of a company starts their business on their own, they will often do so using their personal computer. As the business grows, a computer network will be needed.

Continue reading
0 Comments

Today’s Network Security is about Controlling Information

b2ap3_thumbnail_netseccloud400.jpgThe modern IT landscape is dramatically changing from a model where an IT department controls everything, to companies outsourcing their IT services. This paradigm shift challenges older ideas about traditional network security equating ownership and control with strong security. Does your business view IT outsourcing as a security help or a hindrance?

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

SecurityTip of the WeekTechnologyBest PracticesPrivacyCloudInternetMicrosoftSoftwareBusiness ComputingGoogleBusiness ManagementHackersEfficiencyProductivityHosted SolutionsUser TipsInnovationBackupManaged Service ProviderBusinessWorkplace TipsMalwareIT ServicesMobile DevicesComputerHardwarewindowsUpgradeNetwork SecurityCommunicationIT SupportMiscellaneousSaving MoneyEmailProductivityVirtualizationDataSmartphonesWindows 10GadgetsSmartphoneAppsBusiness ContinuityVoIPServerDisaster RecoveryBrowserMicrosoft OfficeMobile Device ManagementSmall BusinessNetworkMobile ComputingInformation TechnologyTech TermSocial MediaQuick TipsPasswordsHealthAndroidCybersecurityGoing GreenHolidayOperating SystemData BackupMobile OfficeSave MoneyWindows 10Office 365ChromeBest PracticeCollaborationspamCybercrimeOutsourced ITcommunicationsAppApplicationOfficeAlertEmployer-Employee RelationshipData SecurityBYODLaw EnforcementMarketingManaged IT ServicesSearchData RecoveryUsersInternet of ThingsRansomwareBring Your Own DeviceTabletRemote ComputingWearable TechnologyThe Internet of ThingsAppleFacebookVendor ManagementWiFiRemote MonitoringMobilityAntivirusUnified Threat ManagementAvoiding DowntimeiPhoneRisk ManagementCost ManagementIT SupportMoneyHackingMaintenanceSaving TimeRouterPhishingWireless TechnologyBDRHistoryUser ErrorBandwidthAutomationHard DrivesOffice TipsPasswordIT SolutionsCloud ComputingTech SupportBig DataData ManagementComputersEncryptionSocialTelephone SystemsCustomer Relationship ManagementOneNoteGovernmentBudgetLithium-ion batteryCurrent EventsPhone SystemWirelessVPNHumorTwo-factor AuthenticationInformationWebsiteUpdateNet NeutralityUnsupported SoftwarePrinterSocial NetworkingWi-FiShortcutOutlookVulnerabilityGmailUSBPowerPointNetworkingAnalyticsGoogle DriveProactive ITFirewallArtificial IntelligenceAuditManaged ITEntertainmentIntranetRecoveryLaptopBlockchainAugmented RealityPersonal InformationContent FilteringIdentity TheftManaged IT ServicesIT COnsultantEducationTelevisionWork/Life BalanceRetailExcelComputer RepairMobile DeviceMeetingsPoliticsTravelVirusadministrationSocial EngineeringStreaming MediaDisasterTrendingApplicationsOnline CurrencyTouchscreenCortanaEvernoteSportsHybrid CloudWindows 8SamsungBenefitseWasteBatteryComputer AccessoriesSaaSAutomobileValueCleaningPoint of SalePrinter ServerHaaSSave TimeData ProtectionProgrammingManaging StressTwitterComputer CareWordStorageGoogle AssistantConferencingIT ManagementhackerDisplayAmazonPaperless OfficeDevicesManaged ServiceLegalHosted SolutionTransportationFax ServerCommercePatch ManagementEnd of SupportBusiness IntelligenceFlexibilityTelephonyCustomer ServiceComputingFraudBiometricsUninterrupted Power SupplySalesGoogle DocsHard DrivePrivate CloudVirtual RealityBusiness TechnologyData StorageScamHIPAAWireless ChargingInternet ExlporerAccess ControlHuman ResourcesMobile SecurityDDoSWannaCryData BreachInstant MessagingEmailsProject ManagementDistributed Denial of ServiceBlack MarketComplianceIdentityDebateHelp DeskMonitorsElectronic Medical RecordsBloatwareProjectsIT budgetKeyboard ShortcutsLicensingInbound MarketingData PrivacyWebinarLegislationCommunityNanotechnologyWorkersFilesSafetyOperating SysytemVirtual AssistantISPWindows 7PayrollTrainingTabletsBrandingIntrantetMouseChromebookIT solutionsComparisonRoot Cause AnalysisUpdatesChromecastHBOAlexa for BusinessWIndows 7Co-Managed ServicesLifestyleBloggingIdentitiesSecurity CamerasTutorialCompany CultureNFLNetwork CongestionPrintingWindows 10sSpecificationsMicrosoft WordReputationRegulationsTelephoneLanguageMachine LearningBluetoothWorker CommuteAdministratorjunkSolid State DriveCo-managed ITSettingsDevice SecurityKeyboardCamerasSoftware as a ServiceUserHyperlinkDowntimeWindows InkSharePointVideo GamesAccessfilterComputer ForensicsHard Disk DriveGiftsNokiaHiring/FiringWIndows Server 2008Virtual DesktopPresentationOneDriveBest AvailableWasting TimeGift GivingProactiveE-CommercePrint ServerGoogle MapsTeamworkScienceManagementYoutubeCredit CardsSpywareSmart TechnologyVendorAccessoryEbayWebsitesPayment CardsMicrobloggingData LossRobotWireless InternetFAQSyncBuisnessAdvertisingEmployee-Employer RelationshipPeripheralData TheftEmployeeRunning CableScalabilityExperienceData storageGamificationiOSChargerEdgePDFNear Field CommunicationApp storeBreak/FixWebinarUpgradesMicrosoft ExcelImagesHow ToComputer FanMusic3D PrintingMemoryTestingScreen MirroringCiminalSurge ProtectorEmployer Employee RelationshipAdobeText MessagingIT consultingMedical ITConsultantFile SharingBooksTouchpadFinancialCameraCastAdminReliable Computing