Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: New Password Recommendations by NIST

Tip of the Week: New Password Recommendations by NIST

Passwords are always a major pain point for businesses, but in some industries, their importance is emphasized more than others. In particular, government-based organizations need to be prepared to keep more secure passwords. While we understand that not all organizations are government-based, there’s something to be said about proper password practices that we can all learn something from.

Continue reading
0 Comments

Is It Safe to Have Your Browser Remember Your Passwords?

Is It Safe to Have Your Browser Remember Your Passwords?

Let’s be honest - not all of us have the best memories. This makes the ability for many browsers to remember our passwords seem like a godsend. However, is this capability actually a good thing for your cybersecurity? The answer may not surprise you.

Continue reading
0 Comments

Would You Fall for this Adult Scam if You Saw an Old Password?

Would You Fall for this Adult Scam if You Saw an Old Password?

As you may expect, the average Internet scammer isn’t above resorting to dirty tricks to claim their ill-gotten prize from their victims. A recent scam demonstrates just how dirty these tricks can truly be, and unfortunately, how ill-prepared many are to handle them.

Continue reading
0 Comments

Is Your Password Security Up to Par?

Is Your Password Security Up to Par?

Passwords are all over the place these days, whether they’re required to access an online account, or access the devices used to open these accounts. While both types of passwords can make for ideal security conditions, this is only the case if the passwords are strong. If your passwords can be guessed by just about anyone, can you really call it a security measure? New insights from SplashData show that passwords aren’t being considered as much as they need to be.

Continue reading
0 Comments

eBay Revamps Security Protocols. Should Your Business Follow Suit?

eBay Revamps Security Protocols. Should Your Business Follow Suit?

As technology advances and allows for common pain points to be corrected, many of today’s most well-known entities will adopt new solutions to ease the experience of their customers and clients. Take, for example, eBay. The famous reselling site has been taking steps to install an assortment of new features to improve its customers’ experience.

Recent comment in this post
Serina Mccormick
We have to suite it with the security protocols while changing this from the parts of the every work to do there. Customers experi... Read More
Friday, 15 March 2019 11:48
Continue reading
1 Comment

Tip of the Week: Why Routinely Changing Your Password May Be a Bad Idea

Tip of the Week: Why Routinely Changing Your Password May Be a Bad Idea

You’ve heard it said that it’s a best security practice to routinely change your passwords. The idea here is that, if a password were stolen, then it would lose its value when the user goes to change it. While this sounds like solid logic, new research shows that it may actually be better NOT to change your passwords.

Continue reading
0 Comments

How We Know that Mark Zuckerberg Has Never Seen Spaceballs

How We Know that Mark Zuckerberg Has Never Seen Spaceballs

Twitter recently experienced a major hack where it saw 33 million user login credentials stolen. What may be more alarming than the hack itself is what the stash of stolen credentials reveal about users’ password security habits. Or, to put it more accurately, the lack thereof.

Continue reading
0 Comments

New Study Shows Passwords Can, In Fact, be Remembered

b2ap3_thumbnail_people_remember_passwords_400.jpgWe see a lot of password-bashing these days, and some people have lost faith in them as a security measure. But, unfortunately, a lot of the blame for this lies in human memory. We just don’t pick passwords that are strong enough. In fact, a mind-numbing one in 20 people still use “password” to keep their information safe.

Continue reading
0 Comments

How to Change Office 365 User Password

 

For users who are hosted with Microsoft Office 365 or a similar hosted provider, if you receive a prompt within your email application (i.e. Outlook) constantly asking for your password it may have expired on the Office 365 (or hosted provider) portal site. Utilize the following steps to change your password and remove the pop up message from your mail application:

 

Recent comment in this post
Tammy DMeacham
It is so good to know that how to change office 365 user password and I hope many people need this to solve their issues. I am sti... Read More
Tuesday, 18 September 2018 10:14
Continue reading
1 Comment

Urgent: Protect Yourself Against Heartbleed

b2ap3_thumbnail_bleeding_heart_three_400.jpgApril 7th 2014 was a big day for the world, not only because Microsoft ended security support for Windows XP, but because a massive security flaw was found in the OpenSSL cryptographic library. This problem, called the Heartbleed bug, was found by Google Security, and it leaks information from any applications and services utilizing OpenSSL. The problem, however, is not that it was found; the problem is that over two-thirds of the entire Internet contains sites that utilize the OpenSSL/TLS protocol specification. It also doesn't help that this bug has been active since December of 2012.

Continue reading
0 Comments

5 Ways a Hacker can Crack Your Password

b2ap3_thumbnail_sec400.jpgAll that stands between a hacker and your sensitive information is one puny password. You may think that your password is uncrackable because it has served you well all these years, but the reality of the situation is that an experienced hacker can break almost any password. Here are the most popular methods.

Continue reading
0 Comments

What is your Identity Worth to You?

identityYour identity has quite a lot of value, especially in the wrong hands. Security firm ZoneAlarm put together some numbers in 2011 concerning identity fraud, and it even shocked us. Let's talk about a few of these statistics and what it means.

Continue reading
0 Comments

H.A.C.K. Your Way to Strong Password Management

b2ap3_thumbnail_lock400.jpgIt's a network security best practice to regularly switch out old passwords for new ones. However, if you're the one changing and distributing the new passwords, you may face resistance from office workers that see this mandate as an inconvenience. To make sure everyone is onboard, you will need to preach the importance of password security.

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

SecurityTip of the WeekTechnologyBest PracticesPrivacyInternetCloudMicrosoftBusiness ComputingHackersSoftwareEfficiencyGoogleBusiness ManagementInnovationProductivityHosted SolutionsBackupUser TipsWorkplace TipsManaged Service ProviderMalwareBusinessMobile DevicesNetwork SecurityHardwareIT ServicesProductivitywindowsComputerUpgradeEmailDataCommunicationIT SupportMiscellaneousSaving MoneyGadgetsSmartphonesVirtualizationAppsWindows 10SmartphoneSmall BusinessNetworkDisaster RecoveryBusiness ContinuityServerBrowserVoIPMobile Device ManagementMicrosoft OfficeMobile ComputingAndroidSocial MediaHealthTech TermInformation TechnologyQuick TipsPasswordsCybersecurityData BackupOffice 365HolidayMobile OfficeOperating SystemGoing GreenWindows 10Data RecoverySave MoneycommunicationsOfficeChromespamAlertBest PracticeOutsourced ITCollaborationCybercrimeUsersApplicationInternet of ThingsEmployer-Employee RelationshipBYODAppMarketingSearchData SecurityLaw EnforcementRansomwareManaged IT ServicesIT SupportTabletWearable TechnologyRemote ComputingPhishingWirelessAppleVendor ManagementWiFiBring Your Own DeviceThe Internet of ThingsFacebookiPhoneUser ErrorRemote MonitoringUnified Threat ManagementRisk ManagementAntivirusCost ManagementAvoiding DowntimeHackingMaintenanceSaving TimeMobilityHistoryRouterWireless TechnologyBDRMoneyAutomationHard DrivesBandwidthOffice TipsPasswordArtificial IntelligenceComputersData ManagementSocialIT SolutionsTelephone SystemsCustomer Relationship ManagementTech SupportBig DataEncryptionOneNoteCloud ComputingGovernmentFirewallVulnerabilityTwo-factor AuthenticationUpdateLithium-ion batteryCurrent EventsGoogle DriveSocial NetworkingVPNShortcutHumorWebsiteNet NeutralityEducationNetworkingPrinterOutlookManaged IT ServicesGmailInformationUSBUnsupported SoftwareBudgetPowerPointPhone SystemAnalyticsWi-FiProactive ITMobile DevicePoliticsTrendingAuditIT COnsultantIntranetAugmented RealityComputer RepairLaptopExcelContent FilteringMeetingsTravelApplicationsManaged ITTelephonyVirusBatteryTelevisionadministrationPersonal InformationRetailPaperless OfficeSocial EngineeringBlockchainIdentity TheftDisasterEntertainmentWordWork/Life BalanceRecoveryManaged ServiceStreaming MediaFlexibilityPatch ManagementHaaSOnline CurrencyManaging StressFraudStorageData StorageScamGoogle DocsBusiness TechnologyPoint of SaleWireless ChargingYoutubePrinter ServerHosted SolutionWannaCryMobile SecurityBusiness IntelligenceFile SharingTouchscreenData BreachCustomer ServiceTwitterProject ManagementProgrammingSamsungBiometricsCortanaSalesHard DriveHybrid CloudUninterrupted Power SupplyEvernoteVirtual RealityPrivate CloudDisplayAmazonAutomobileHIPAACleaningOneDriveInternet ExlporerHuman ResourcesDDoSFax ServerInstant MessagingSave TimeEmailsComputingPrintingComputer CareData ProtectionWindows 8hackerSportsBenefitsGoogle AssistantConferencingIT ManagementeWasteComputer AccessoriesLegalDevicesValueTransportationSaaSAccess ControlCommerceEnd of SupportManagementWIndows 7LifestyleCredit CardsAdminSpywareRobotVendorNetwork CongestionAccessory5GWebsitesRegulationsData LossAdvertisingBluetoothWireless InternetFAQScalabilityKeyboard ShortcutsExperiencejunkSyncData storageEmployee-Employer RelationshipiOSPeripheralEmployeesData TheftCamerasPDFSharePointCommunityGamificationUpgradesUserChargerHow ToPayrollEdgeMusicfilterISPComputer FanScreen MirroringVirtual DesktopVoice over Internet ProtocolApp storeEmployer Employee RelationshipPresentationNokiaMicrosoft ExcelText MessagingIntrantetTeamworkMemoryConsultantBest AvailableGift GivingScienceTutorialSecurity CamerasCiminalBooksAdobeTouchpadBloggingTestingCastSabotageMicrobloggingFinancialBlack MarketMachine LearningElectronic Medical RecordsCameraMonitorsBuisnessPCIdentityRunning CableCo-managed ITWebinarNanotechnologyDowntimeIT budgetSafetyLicensingOperating SysytemProjectsSmartwatchData PrivacyTrainingNear Field CommunicationLegislationWebinarImagesVirtual AssistantIT solutionsWorkersRoot Cause AnalysisPrint ServerE-CommerceTabletsWindows 7Server MaintenanceChromebookCompany CultureIT consultingComparisonHBOAlexa for BusinessWindows 10sUpdatesCo-Managed ServicesPayment CardsIdentitiesNFLReputationEbayInvestmentReliable ComputingSpecificationsMicrosoft WordWorker CommuteComplianceDebateAdministratorHelp DeskDistributed Denial of ServiceSolid State DriveTelephoneSettingsBloatwareEmployeeLanguageKeyboardROIVideo GamesDevice SecurityInbound MarketingAccessSoftware as a ServiceHard Disk DriveHyperlinkBreak/FixHiring/FiringWindows InkFiles3D PrintingBrandingComputer ForensicsGiftsWIndows Server 2008MouseSurge ProtectorWasting TimeMedical ITProactiveSmart TechnologyGoogle MapsChromecast