Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Who You Sit Next to Makes You More or Less Productive, Study Finds

Who You Sit Next to Makes You More or Less Productive, Study Finds

It turns out that the old adage “iron sharpens iron” is true and it applies to the modern workplace. This, according to a new study by Harvard Business Review, which found that the productivity of a worker can be enhanced by an average of ten percent simply by having them be in close proximity to someone who’s more productive than they are.

Continue reading
0 Comments

Tip of the Week: 4 Power Tips for Windows 10 Users

Tip of the Week: 4 Power Tips for Windows 10 Users

Windows 10 is almost one year old, and people have found all sorts of ways to best leverage Microsoft’s great new operating system to their business’s advantage. Yet, some folks tend to forget some of the most basic new features that got everyone so excited about Windows 10 in the first place. Have you taken advantage of these Windows 10 features yet?

Continue reading
0 Comments

Tip of the Week: How to Avoid Back Pain and Eye Strain in the Office

Tip of the Week: How to Avoid Back Pain and Eye Strain in the Office

Working at a desk is a fairly inescapable for the modern office worker. The trouble with sitting at a desk for long intervals is that it causes physical issues, especially if the workspace isn’t properly set up. Fortunately, you don’t have to invest in specialized equipment; it’s fairly simple to establish best practices that will ensure employee comfort and productivity.

Continue reading
0 Comments

Lock Your Doors and 2 Other No-Brainer Tips to Protect Your Data

b2ap3_thumbnail_desk_lock_security_400.jpgYou know the saying “you can never be too careful”? It’s always said by the person who understands the value of proceeding with caution, and understands that all it takes is a moment to lose everything. In some cases, it could be your workplace dignity, but in others, you need to cover your tracks to prevent hackers and other miscreants from performing the unspeakable: messing with your computer while you’re away from it momentarily.

Continue reading
0 Comments

Your Biggest Vulnerability May Come From Forgetting to Logout

b2ap3_thumbnail_your_workspace_400.jpgEven if you have the best network security tools in place, you can still fall victim to a major data breach, just by doing something as seemingly-harmless as not manually logging out of your online accounts.

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

SecurityTip of the WeekTechnologyBest PracticesPrivacyCloudInternetMicrosoftBusiness ComputingSoftwareHackersEfficiencyBusiness ManagementGoogleInnovationProductivityHosted SolutionsBackupUser TipsWorkplace TipsManaged Service ProviderMalwareProductivityMobile DevicesNetwork SecurityBusinessIT ServicesHardwareUpgradeComputerwindowsCommunicationEmailDataGadgetsSmartphonesIT SupportMiscellaneousSaving MoneyVirtualizationAppsWindows 10SmartphoneDisaster RecoveryBusiness ContinuitySmall BusinessNetworkVoIPServerMobile Device ManagementBrowserMicrosoft OfficeHealthInformation TechnologyTech TermAndroidSocial MediaMobile ComputingPasswordsQuick TipsCybersecurityMobile OfficeData BackupOffice 365Going GreenHolidayOperating SystemWindows 10Data RecoveryBYODSave MoneycommunicationsOfficeChromeCollaborationCybercrimeApplicationInternet of ThingsEmployer-Employee RelationshipAppUsersOutsourced ITAlertBest PracticespamData SecurityMarketingLaw EnforcementSearchManaged IT ServicesIT SupportRansomwareTabletRemote ComputingWirelessPhishingWearable TechnologyThe Internet of ThingsAppleVendor ManagementFacebookWiFiBring Your Own DeviceAvoiding DowntimeMobilityiPhoneHackingRisk ManagementCost ManagementMaintenanceSaving TimeRouterMoneyWireless TechnologyBDROneNoteHistoryUser ErrorAutomationRemote MonitoringAntivirusUnified Threat ManagementArtificial IntelligenceOffice TipsPasswordHard DrivesData ManagementComputersSocialIT SolutionsTech SupportTelephone SystemsBig DataEncryptionCloud ComputingCustomer Relationship ManagementGovernmentBandwidthUpdateCurrent EventsVPNHumorWebsiteShortcutInformationNet NeutralityEducationManaged IT ServicesPrinterSocial NetworkingNetworkingOutlookUnsupported SoftwareGmailUSBWi-FiPowerPointBudgetAnalyticsVulnerabilityPhone SystemProactive ITFirewallGoogle DriveLithium-ion batteryTwo-factor AuthenticationLaptopAugmented RealityContent FilteringExcelBlockchainManaged ITBatteryPersonal InformationIT COnsultantMeetingsTelephonyTravelWordTelevisionIdentity TheftRetailComputer RepairPaperless OfficeSocial EngineeringManaged ServiceWork/Life BalanceVirusInstant MessagingadministrationEntertainmentMobile DevicePoliticsRecoveryStreaming MediaDisasterTrendingAuditApplicationsIntranetWannaCryStorageTouchscreenAccess ControlWindows 7Point of SalePrinter ServerSamsungHosted SolutionProgrammingTwitterBusiness IntelligencePrintingAutomobileData ProtectionCustomer ServiceCleaningConferencingDisplayBiometricsGoogle AssistantAmazonIT ManagementPrivate CloudVirtual RealitySave TimeOneDriveComputer CareHIPAADevicesYoutubeFax ServerInternet ExlporerhackerHuman ResourcesComputingPatch ManagementDDoSData LossEmailsLegalUninterrupted Power SupplySalesHard DriveFraudTransportationGoogle DocsSportsCommerceEnd of SupportFlexibilityBenefitseWasteComputer AccessoriesBusiness TechnologyWireless ChargingSaaSValueFile SharingData StorageScamMobile SecurityData BreachOnline CurrencyWindows 8HaaSProject ManagementCortanaManaging StressHybrid CloudEvernoteCommunityProjectsBooksjunkIT budgetBreak/FixTouchpadLicensingWindows Server 2008 R2ISPLegislationCastCamerasData PrivacyUserVirtual AssistantBlack MarketIntrantetWorkersSharePointMonitorsElectronic Medical RecordsfilterMedical ITTabletsDevelopmentComparisonBloggingLifestyleTutorialVirtual DesktopPresentationChromebookWebinarBest AvailableAlexa for BusinessUpdatesAdminHBOTeamworkNanotechnologyScienceCo-Managed ServicesSafetyIdentities5GOperating SysytemNFLMicrsosoftSpecificationsTrainingIT solutionsMicrosoft WordKeyboard ShortcutsCo-managed ITRoot Cause AnalysisTelephoneLanguageEmployeesBuisnessCompany CultureWindows 10sSoftware as a ServiceDevice SecurityPayrollRunning CableNokiaHyperlinkVoice over Internet ProtocolReputationWindows InkGiftsGift GivingPrint ServerNear Field CommunicationComputer ForensicsSolid State DriveWorker CommuteSecurity CamerasAdministratorWIndows Server 2008SettingsWasting TimeKeyboardProactiveSabotageGoogle MapsManagementVideo GamesCredit CardsEbayMicrobloggingIT consultingHard Disk DriveVendorSpywareMachine LearningAccessAccessoryHiring/FiringWebsitesPCWireless InternetFAQReliable ComputingDistributed Denial of ServiceEmployee-Employer RelationshipComplianceDowntimeSyncBloatwarePeripheralSmart TechnologyData TheftSmartwatchGamificationChargerWebinarImagesInbound MarketingEdgeE-CommerceRobot3D PrintingMicrosoft ExcelFilesSurge ProtectorApp storeServer MaintenanceAdvertisingMemoryScalabilityBrandingiOSMouseTestingExperienceCiminalPayment CardsData storageAdobeChromecastInvestmentPDFHelp DeskWIndows 7FinancialHow ToDebateUpgradesComputer FanNetwork CongestionCameraMusicEmployeeScreen MirroringEmployer Employee RelationshipRegulationsIdentityROIText MessagingConsultantBluetooth