Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How to Select a Modem for Your Business

How to Select a Modem for Your Business

Most Internet providers will ask you to rent your modem from them, but what they don’t tell you is that you often have the opportunity to purchase your own. What are the benefits of doing so, and how can you make the best decision possible while modem shopping? We’re here to give you a hand.

Continue reading
0 Comments

Tip of the Week: Evaluating and Assessing Risk

Tip of the Week: Evaluating and Assessing Risk

Whenever you decide to implement something in your information technology strategy, you accept some level of risk. Understanding and managing this risk is crucial to your business’ success. For this week’s tip, we’ll review how to manage your IT risks and what your options are.

Continue reading
0 Comments

Tip of the Week: Changing Your Network Profile

Tip of the Week: Changing Your Network Profile

The Windows operating system has different settings for connecting to different networks. While this may seem like a minor detail, it actually can have considerable ramifications to your cybersecurity, not to mention that of your business. For this week’s tip, we’ll discuss how to use your network profile to stay secure, based on your situation.

Continue reading
0 Comments

A Brief Overview of Network Security

A Brief Overview of Network Security

The reliance the modern business has on its IT cannot be understated. As a result, to keep their computing network and infrastructure running efficiently, companies need to have a network and cybersecurity policy in place. With the development and use of organizational computer networks with multiple endpoints, understanding the basics of network security is helpful when implementing and employing network security systems. Today, we take a look at the parts of your network, their functions, and what you need to do to protect them.

Continue reading
0 Comments

Tech Term: Router

Tech Term: Router

The more that people depend on mobile devices and portable computers to get work done, the more businesses have to consider how to manage their organization’s wireless network. The router is the piece of hardware that makes the wireless network possible. Today, we will talk a little bit about the router and how its configuration can dictate the strength, reliability, and security of your business’ wireless network.

Continue reading
0 Comments

You Can’t Afford to Let Your Network Go Unmanaged

You Can’t Afford to Let Your Network Go Unmanaged

While maintaining any system can be a pain, your business can’t afford not to maintain your network. An MSP can help you to do so, delivering the benefits of regular network maintenance.

Continue reading
0 Comments

Tip of the Week: The Easiest Way to Share Files Between 2 PCs

b2ap3_thumbnail_new_home_networking_400.jpgSo you’ve got two personal computers and you need to share a file from one to the other. What’s the best way to go about this? You might be surprised to learn that doing this is as easy as dragging and dropping.

Continue reading
0 Comments

How a Small Bottleneck Issue Can Significantly Hinder Network Performance

b2ap3_thumbnail_bottlenecking_network_400.jpgIf you shell out for brand new office equipment, you’ll naturally expect it to perform better than your older machines. Sometimes the age of your network hardware isn’t the only problem affecting your network’s performance. More often than not, network bottlenecking could be the issue at hand.

Continue reading
0 Comments

3 WiFi Tips To Improve Performance and Troubleshoot Issues

b2ap3_thumbnail_wifi_internet_connection_400.jpgIn the modern business landscape, WiFi is more important than ever before. In recent years, the capabilities of WiFi technology have improved dramatically, prompting more businesses to utilize wireless technology. An increased dependency on WiFi means that a working wireless connection is critical to operations. This requires knowing how to both properly setup and maintain your wireless network.

Continue reading
0 Comments

Tip of the Week: 5 Ways to Extend Your WiFi Signal

b2ap3_thumbnail_wifi_extention_400.jpgToday, having a strong WiFi signal is critical. You need a reliable signal for every part of your home, office, and even outside the building. Is your wireless signal strong in some areas and spotty in others? Would your life be immensely easier if your signal extended for just one or two more rooms? For this week’s tip, here’s how you can extend your WiFi signal.

Continue reading
0 Comments

How Will Future Technologies Change Two-Factor Authentication?

b2ap3_thumbnail_two_factor_authentication_400.jpgIn these times, passwords are losing their effectiveness. Hackers can now input millions of passwords every second to crack your code. Even now, professionals are working on new solutions which can jumpstart online security. While using a password is still an ideal choice, there are plenty of other options that are being discussed in the two-factor authentication field.

Continue reading
0 Comments

It’s Imperative that You Use Correct KVM Switches

b2ap3_thumbnail_kvm_switch_400.jpgYour company's IT infrastructure is much like a puzzle. There are many different pieces that make it up, and each piece is needed for the entire network to work properly. One piece of equipment that often gets overlooked is the KVM switch. Here are three tips on finding the right KVM for your business.

Continue reading
0 Comments

“Zero Trust” Network Security: Only Trust Data as Far as You Can Throw It!

b2ap3_thumbnail_zero_trust_400.jpgWhen it feels like everybody is out to get you, there's only one way to survive: Trust nobody. You may not have too many physical enemies ready to jump you, but there's an army of hackers wanting to breach your company's database. One of the securest ways to keep your company's information safe is to implement a "zero trust" network security model.

Continue reading
0 Comments

au·dit/ noun/: a systematic review or assessment of something

b2ap3_thumbnail_it_audit_400.jpgAre you confident that your company's network is 100 percent secure? The best way to answer "yes" to this question is with a network audit. This is a technical procedure where IT professionals analyze every nook and cranny of your system, looking for every possible vulnerability. No matter what the situation is with your company's IT management, a network audit is worth doing.

Continue reading
0 Comments

Don’t Overlook the Mobile Devices Accessing Your Network

b2ap3_thumbnail_mobile_overlooked_400.jpgThe number of employees using their personal devices for work purposes (BYOD) continues to increase rapidly. According to Juniper Research, BYOD will account for over one-third of all mobile devices being used within the next few years. Not adjusting procedures to accommodate for this trend can leave your company's sensitive information vulnerable.

Continue reading
0 Comments

Adding a Computer Network to Your Startup Business

b2ap3_thumbnail_computer_network400.jpgOne of the most significant signs that a small startup company is on its way to becoming a mid-sized business is when operations require more than one workstation. Whenever the founder of a company starts their business on their own, they will often do so using their personal computer. As the business grows, a computer network will be needed.

Recent comment in this post
Ellie Meston
The IT support professionals are the company which provides help in the business start up regarding the IT support in every place.... Read More
Wednesday, 12 June 2019 06:38
Continue reading
1 Comment

Today’s Network Security is about Controlling Information

b2ap3_thumbnail_netseccloud400.jpgThe modern IT landscape is dramatically changing from a model where an IT department controls everything, to companies outsourcing their IT services. This paradigm shift challenges older ideas about traditional network security equating ownership and control with strong security. Does your business view IT outsourcing as a security help or a hindrance?

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

SecurityTip of the WeekTechnologyBest PracticesPrivacyCloudInternetMicrosoftBusiness ComputingSoftwareHackersEfficiencyGoogleBusiness ManagementInnovationProductivityHosted SolutionsBackupUser TipsWorkplace TipsManaged Service ProviderMalwareNetwork SecurityMobile DevicesBusinessIT ServicesHardwareProductivityComputerwindowsUpgradeCommunicationEmailDataIT SupportMiscellaneousSaving MoneyGadgetsSmartphonesVirtualizationAppsWindows 10SmartphoneDisaster RecoveryBusiness ContinuitySmall BusinessNetworkVoIPServerBrowserMicrosoft OfficeMobile Device ManagementInformation TechnologyAndroidHealthTech TermSocial MediaMobile ComputingPasswordsQuick TipsCybersecurityData BackupGoing GreenHolidayWindows 10Operating SystemData RecoveryMobile OfficeOffice 365Save MoneycommunicationsOfficeChromeCollaborationBYODCybercrimeApplicationInternet of ThingsEmployer-Employee RelationshipOutsourced ITAppUsersspamAlertBest PracticeLaw EnforcementMarketingManaged IT ServicesSearchData SecurityIT SupportRansomwareWirelessRemote ComputingPhishingTabletWearable TechnologyThe Internet of ThingsFacebookAppleVendor ManagementWiFiBring Your Own DeviceAvoiding DowntimeHackingiPhoneRisk ManagementCost ManagementMoneyMaintenanceRouterSaving TimeWireless TechnologyBDRAutomationHistoryUser ErrorRemote MonitoringAntivirusUnified Threat ManagementMobilityComputersData ManagementHard DrivesSocialIT SolutionsTelephone SystemsTech SupportCloud ComputingBig DataEncryptionOneNoteGovernmentCustomer Relationship ManagementArtificial IntelligenceBandwidthOffice TipsPasswordShortcutVPNHumorWebsiteManaged IT ServicesNet NeutralityEducationNetworkingUnsupported SoftwarePrinterOutlookSocial NetworkingWi-FiGmailInformationUSBVulnerabilityBudgetPowerPointAnalyticsPhone SystemGoogle DriveProactive ITFirewallTwo-factor AuthenticationLithium-ion batteryUpdateCurrent EventsContent FilteringPersonal InformationMeetingsTravelApplicationsIdentity TheftTelephonyTelevisionIT COnsultantRetailPaperless OfficeSocial EngineeringBlockchainWork/Life BalanceComputer RepairMobile DeviceEntertainmentWordPoliticsVirusRecoveryadministrationManaged ServiceStreaming MediaTrendingDisasterAuditManaged ITIntranetLaptopBatteryAugmented RealityExcelWireless ChargingPoint of SalePrinter ServerAutomobileHosted SolutionBusiness IntelligenceMobile SecurityFile SharingCleaningData BreachCustomer ServiceProgrammingProject ManagementTwitterBiometricsCortanaSave TimeEvernoteComputer CareHybrid CloudVirtual RealityDisplayPrivate CloudhackerAmazonHIPAAOneDriveInternet ExlporerAccess ControlHuman ResourcesFax ServerLegalDDoSInstant MessagingEmailsYoutubeTransportationEnd of SupportPrintingCommerceComputingData ProtectionFlexibilitySportsBenefitsGoogle AssistantConferencingUninterrupted Power SupplyIT ManagementSaleseWasteHard DriveComputer AccessoriesScamData StorageValueDevicesSaaSPatch ManagementHaaSWannaCryOnline CurrencyData LossManaging StressFraudTouchscreenStorageGoogle DocsWindows 8SamsungBusiness TechnologyOperating SysytemVirtual DesktopIntrantetPresentationApp storeNanotechnologyMicrosoft ExcelSafetyTrainingE-CommerceTeamworkBest AvailableMemoryScienceTestingCiminalIT solutionsBloggingAdobeServer MaintenanceTutorialRoot Cause AnalysisCompany CultureLifestylePayment CardsFinancialCameraWindows 10sInvestmentReputationBuisnessIdentityCo-managed ITEmployeeRunning CableProjectsIT budgetSolid State DriveLicensingWorker CommuteROIAdministratorNear Field CommunicationData PrivacySettingsLegislationKeyboardWorkersVideo GamesBreak/FixVirtual AssistantWindows 7Hard Disk DriveTabletsPrint ServerAccessNokiaIT consultingChromebookComparisonHiring/FiringUpdatesGift GivingHBOMedical ITAlexa for BusinessCo-Managed ServicesIdentitiesEbayNFLSmart TechnologyAdminReliable ComputingSpecificationsComplianceMicrosoft Word5GMicrobloggingDistributed Denial of ServiceRobotBloatwareTelephoneLanguageAdvertisingKeyboard ShortcutsSoftware as a ServiceInbound MarketingDevice SecurityScalabilityEmployeesData storageHyperlinkiOSWindows InkExperienceFilesGiftsPDFPayrollBrandingComputer Forensics3D PrintingUpgradesWIndows Server 2008How ToVoice over Internet ProtocolSurge ProtectorWebinarImagesMouseWasting TimeProactiveComputer FanGoogle MapsMusicChromecastCredit CardsEmployer Employee RelationshipText MessagingSecurity CamerasWIndows 7ManagementScreen MirroringVendorSpywareConsultantSabotageNetwork CongestionTouchpadAccessoryRegulationsWebsitesBooksFAQMachine LearningBluetoothWireless InternetCastEmployee-Employer RelationshipjunkSyncBlack MarketPCDebateHelp DeskPeripheralCamerasData TheftMonitorsElectronic Medical RecordsChargerCommunityDowntimeSharePointUserGamificationISPfilterEdgeWebinarSmartwatch