Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Is It Safe to Have Your Browser Remember Your Passwords?

Is It Safe to Have Your Browser Remember Your Passwords?

Let’s be honest - not all of us have the best memories. This makes the ability for many browsers to remember our passwords seem like a godsend. However, is this capability actually a good thing for your cybersecurity? The answer may not surprise you.

Continue reading
0 Comments

Would You Fall for this Adult Scam if You Saw an Old Password?

Would You Fall for this Adult Scam if You Saw an Old Password?

As you may expect, the average Internet scammer isn’t above resorting to dirty tricks to claim their ill-gotten prize from their victims. A recent scam demonstrates just how dirty these tricks can truly be, and unfortunately, how ill-prepared many are to handle them.

Continue reading
0 Comments

Is Your Password Security Up to Par?

Is Your Password Security Up to Par?

Passwords are all over the place these days, whether they’re required to access an online account, or access the devices used to open these accounts. While both types of passwords can make for ideal security conditions, this is only the case if the passwords are strong. If your passwords can be guessed by just about anyone, can you really call it a security measure? New insights from SplashData show that passwords aren’t being considered as much as they need to be.

Continue reading
0 Comments

eBay Revamps Security Protocols. Should Your Business Follow Suit?

eBay Revamps Security Protocols. Should Your Business Follow Suit?

As technology advances and allows for common pain points to be corrected, many of today’s most well-known entities will adopt new solutions to ease the experience of their customers and clients. Take, for example, eBay. The famous reselling site has been taking steps to install an assortment of new features to improve its customers’ experience.

Continue reading
0 Comments

Tip of the Week: Why Routinely Changing Your Password May Be a Bad Idea

Tip of the Week: Why Routinely Changing Your Password May Be a Bad Idea

You’ve heard it said that it’s a best security practice to routinely change your passwords. The idea here is that, if a password were stolen, then it would lose its value when the user goes to change it. While this sounds like solid logic, new research shows that it may actually be better NOT to change your passwords.

Continue reading
0 Comments

How We Know that Mark Zuckerberg Has Never Seen Spaceballs

How We Know that Mark Zuckerberg Has Never Seen Spaceballs

Twitter recently experienced a major hack where it saw 33 million user login credentials stolen. What may be more alarming than the hack itself is what the stash of stolen credentials reveal about users’ password security habits. Or, to put it more accurately, the lack thereof.

Continue reading
0 Comments

New Study Shows Passwords Can, In Fact, be Remembered

b2ap3_thumbnail_people_remember_passwords_400.jpgWe see a lot of password-bashing these days, and some people have lost faith in them as a security measure. But, unfortunately, a lot of the blame for this lies in human memory. We just don’t pick passwords that are strong enough. In fact, a mind-numbing one in 20 people still use “password” to keep their information safe.

Continue reading
0 Comments

How to Change Office 365 User Password

 

For users who are hosted with Microsoft Office 365 or a similar hosted provider, if you receive a prompt within your email application (i.e. Outlook) constantly asking for your password it may have expired on the Office 365 (or hosted provider) portal site. Utilize the following steps to change your password and remove the pop up message from your mail application:

 

Recent comment in this post
Tammy DMeacham
It is so good to know that how to change office 365 user password and I hope many people need this to solve their issues. I am sti... Read More
Tuesday, 18 September 2018 10:14
Continue reading
1 Comment

Urgent: Protect Yourself Against Heartbleed

b2ap3_thumbnail_bleeding_heart_three_400.jpgApril 7th 2014 was a big day for the world, not only because Microsoft ended security support for Windows XP, but because a massive security flaw was found in the OpenSSL cryptographic library. This problem, called the Heartbleed bug, was found by Google Security, and it leaks information from any applications and services utilizing OpenSSL. The problem, however, is not that it was found; the problem is that over two-thirds of the entire Internet contains sites that utilize the OpenSSL/TLS protocol specification. It also doesn't help that this bug has been active since December of 2012.

Continue reading
0 Comments

5 Ways a Hacker can Crack Your Password

b2ap3_thumbnail_sec400.jpgAll that stands between a hacker and your sensitive information is one puny password. You may think that your password is uncrackable because it has served you well all these years, but the reality of the situation is that an experienced hacker can break almost any password. Here are the most popular methods.

Continue reading
0 Comments

What is your Identity Worth to You?

identityYour identity has quite a lot of value, especially in the wrong hands. Security firm ZoneAlarm put together some numbers in 2011 concerning identity fraud, and it even shocked us. Let's talk about a few of these statistics and what it means.

Continue reading
0 Comments

H.A.C.K. Your Way to Strong Password Management

b2ap3_thumbnail_lock400.jpgIt's a network security best practice to regularly switch out old passwords for new ones. However, if you're the one changing and distributing the new passwords, you may face resistance from office workers that see this mandate as an inconvenience. To make sure everyone is onboard, you will need to preach the importance of password security.

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

SecurityTip of the WeekTechnologyBest PracticesPrivacyInternetCloudMicrosoftSoftwareBusiness ComputingBusiness ManagementEfficiencyHackersGoogleProductivityHosted SolutionsBackupUser TipsManaged Service ProviderInnovationWorkplace TipsMalwareBusinessMobile DevicesIT ServicesComputerHardwarewindowsUpgradeNetwork SecuritySaving MoneyIT SupportMiscellaneousEmailDataVirtualizationSmartphonesWindows 10AppsBusiness ContinuityGadgetsSmartphoneCommunicationDisaster RecoveryProductivityVoIPNetworkBrowserMicrosoft OfficeMobile Device ManagementServerTech TermSmall BusinessMobile ComputingInformation TechnologyAndroidQuick TipsHealthSocial MediaPasswordsHolidayOperating SystemData BackupMobile OfficeCybersecurityGoing GreenChromeSave MoneyCybercrimecommunicationsAppOffice 365ApplicationOfficeAlertBest PracticeCollaborationspamManaged IT ServicesWindows 10Data RecoveryOutsourced ITRansomwareEmployer-Employee RelationshipBYODLaw EnforcementMarketingRemote ComputingTabletSearchWearable TechnologyThe Internet of ThingsAppleUsersVendor ManagementWiFiInternet of ThingsData SecurityRisk ManagementCost ManagementIT SupportMoneyHackingMaintenanceSaving TimeRouterPhishingWireless TechnologyBDRHistoryFacebookUser ErrorRemote MonitoringBring Your Own DeviceMobilityAntivirusUnified Threat ManagementAvoiding DowntimeiPhoneHard DrivesOffice TipsPasswordIT SolutionsTech SupportBig DataData ManagementComputersEncryptionSocialTelephone SystemsCustomer Relationship ManagementOneNoteGovernmentBandwidthHumorTwo-factor AuthenticationWebsiteUpdateNet NeutralityUnsupported SoftwarePrinterSocial NetworkingCloud ComputingWi-FiOutlookShortcutVulnerabilityGmailUSBPowerPointNetworkingAnalyticsGoogle DriveProactive ITFirewallArtificial IntelligenceBudgetLithium-ion batteryCurrent EventsPhone SystemAutomationWirelessVPNInformationManaged IT ServicesIT COnsultantEducationTelevisionComputer RepairWork/Life BalanceRetailExcelMobile DevicePoliticsTravelVirusadministrationSocial EngineeringStreaming MediaDisasterTrendingApplicationsAuditManaged ITIntranetRecoveryLaptopBlockchainAugmented RealityContent FilteringIdentity TheftSave TimeData ProtectionProgrammingManaging StressTwitterComputer CareWordStorageGoogle AssistanthackerDisplayAmazonManaged ServicePaperless OfficeDevicesLegalHosted SolutionTransportationBusiness IntelligenceFax ServerCommercePatch ManagementEnd of SupportMeetingsFlexibilityTelephonyCustomer ServiceComputingBiometricsFraudHard DriveUninterrupted Power SupplySalesGoogle DocsPrivate CloudVirtual RealityBusiness TechnologyData StorageScamHIPAAWireless ChargingInternet ExlporerAccess ControlHuman ResourcesDDoSMobile SecurityWannaCryData BreachInstant MessagingEmailsProject ManagementCortanaOnline CurrencyTouchscreenWindows 8EvernoteSportsEntertainmentSamsungBenefitseWasteBatteryComputer AccessoriesPersonal InformationSaaSAutomobileValuePoint of SaleCleaningPrinter ServerHaaSRegulationsMicrosoft WordReputationBluetoothTelephoneLanguageMachine LearningSolid State DriveConferencingWorker CommuteAdministratorjunkCamerasSoftware as a ServiceCo-managed ITSettingsDevice SecurityKeyboardIT ManagementSharePointVideo GamesUserHyperlinkWindows InkHard Disk DriveGiftsAccessfilterComputer ForensicsPresentationNokiaHiring/FiringWIndows Server 2008Virtual DesktopTeamworkOneDriveBest AvailableWasting TimeGift GivingProactivePrint ServerGoogle MapsYoutubeCredit CardsScienceManagementVendorSpywareSmart TechnologyAccessoryEbayWebsitesMicrobloggingData LossFAQRobotWireless InternetEmployee-Employer RelationshipSyncBuisnessAdvertisingRunning CableScalabilityPeripheralData TheftiOSChargerExperienceData storageGamificationNear Field CommunicationEdgePDFImagesHow ToApp storeWebinarUpgradesMicrosoft ExcelComputer FanMusic3D PrintingMemoryIT consultingTestingScreen MirroringCiminalSurge ProtectorEmployer Employee RelationshipAdobeText MessagingConsultantFile SharingFinancialBooksTouchpadReliable ComputingCameraCastAdminHelp DeskDistributed Denial of ServiceBlack MarketComplianceIdentityDebateHybrid CloudMonitorsElectronic Medical RecordsBloatwareProjectsIT budgetKeyboard ShortcutsLicensingWebinarLegislationInbound MarketingData PrivacyVirtual AssistantCommunityNanotechnologyWorkersFilesSafetyOperating SysytemBrandingISPWindows 7PayrollTrainingTabletsIT solutionsComparisonIntrantetMouseChromebookAlexa for BusinessRoot Cause AnalysisUpdatesChromecastHBOWIndows 7Co-Managed ServicesLifestyleBloggingIdentitiesSecurity CamerasTutorialCompany CultureNFLWindows 10sSpecificationsNetwork CongestionPrinting