Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Single Greatest Defense Against Ransomware

The Single Greatest Defense Against Ransomware

In 2017, ransomware became a huge threat for businesses, so when discussing how nefarious actors will be leveraging new ransomware streams in 2018, you have to do so with some urgency. Today we will provide some information on ransomware, the current trends, and some trends you have to be very mindful of going forward.

Continue reading
0 Comments

Sadly, the WannaCry Ransomware Disaster Could Have Been Easily Prevented

Sadly, the WannaCry Ransomware Disaster Could Have Been Easily Prevented

On May 11, 2017, the WannaCry ransomware spread around the globe like wildfire and disabled computing infrastructures belonging to organizations of all shapes and sizes. As the world watched the news unfold, it seemed as if practically no business was immune to this ultra-powerful ransomware. Yet, many quick-thinking organizations were. All because they had the foresight to follow IT best practices.

Continue reading
0 Comments

Cops Lock Up Criminals, Ransomware Locks Up Cops

Cops Lock Up Criminals, Ransomware Locks Up Cops

Society relies on law enforcement to enforce laws in a fair and just manner, but even the police have their work cut out for them when they are targeted by a cyberattack. A recent incident in Cockrell, Texas shows that not even the police are immune to the threats of ransomware--particularly the emerging brand of ransomware, Osiris.

Continue reading
0 Comments

This Halloween, Remember to Check Your Kids’ Mobile Devices for Ransomware

This Halloween, Remember to Check Your Kids’ Mobile Devices for Ransomware

Halloween is a time when we celebrate what scares us, like ghosts, goblins, ghouls, and the like. For adults, the holiday becomes more lighthearted with each passing year, due to the understanding that such monsters are fictional. Yet, there exists real monsters who know how to play on people’s fears, namely, hackers.

Continue reading
0 Comments

When DDoS Attacks and Ransomware Combine, the Results are Ugly

When DDoS Attacks and Ransomware Combine, the Results are Ugly

Ransomware, the malware variant that has appeared more and more frequently has struck again, this time targeting users of Microsoft Outlook in a zero-day attack. A malware variant of Cerber (a ransomware) was recently utilized in a large scale attack on users of the messaging program, sent via phishing emails to corporate users.

Continue reading
0 Comments

New Ransomware Presents Users With 2 Equally-Terrible Options

New Ransomware Presents Users With 2 Equally-Terrible Options

The Petya ransomware, a particularly vicious monster of a threat, has reared its ugly head once again, only this time, it’s not alone. Petya now comes bundled together with Mischa, yet another ransomware that works well alongside Petya. The ransomware is delivered via an inconspicuous email disguised as a job application, with a resume attached. Once the user downloads the file, Petya encrypts the files located on the device.

Continue reading
0 Comments

Alert: Petya Ransomware May Be the Worst Yet

Alert: Petya Ransomware May Be the Worst Yet

Ransomware is such a popular method of attack used by hackers that new variants of it pop up every few months. Among these is Petya, a nasty new ransomware that masquerades as an unsolicited resume in an organization’s email inbox. Don’t be fooled, though; the only work these hackers are looking for is to work you out of a couple hundred dollars.

Continue reading
0 Comments

CryptoLocker is the Worst Video Game Ever

b2ap3_thumbnail_gamers_pwned_400.jpgIt’s been two years since the world was introduced to CryptoLocker, a particularly-nasty ransomware that encrypts a computer’s data while giving the user a deadline to pay a ransom for the encryption key, or else have their data destroyed. What we’re seeing now is that the reach of CryptoLocker is extending beyond the average PC user; even gamers are getting owned by Cryptolocker.

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

SecurityTip of the WeekTechnologyBest PracticesPrivacyInternetCloudMicrosoftSoftwareBusiness ComputingBusiness ManagementGoogleEfficiencyHackersProductivityHosted SolutionsBackupManaged Service ProviderUser TipsInnovationMalwareBusinessWorkplace TipsMobile DevicesIT ServicesComputerHardwarewindowsUpgradeNetwork SecurityIT SupportSaving MoneyMiscellaneousEmailDataSmartphonesWindows 10VirtualizationCommunicationBusiness ContinuityAppsSmartphoneGadgetsVoIPDisaster RecoveryProductivityMobile Device ManagementMicrosoft OfficeServerBrowserNetworkInformation TechnologySmall BusinessTech TermMobile ComputingQuick TipsPasswordsAndroidSocial MediaHealthHolidayData BackupGoing GreenOperating SystemCybersecurityMobile OfficeChromeSave MoneyCybercrimecommunicationsApplicationOfficeOffice 365AppAlertBest PracticespamCollaborationManaged IT ServicesWindows 10BYODData RecoveryMarketingOutsourced ITData SecurityRansomwareEmployer-Employee RelationshipLaw EnforcementAppleUsersVendor ManagementWiFiRemote ComputingInternet of ThingsTabletThe Internet of ThingsSearchWearable TechnologyHistoryHackingIT SupportBring Your Own DeviceMoneyPhishingiPhoneRouterWireless TechnologyBDRRisk ManagementCost ManagementFacebookMaintenanceUser ErrorSaving TimeMobilityRemote MonitoringUnified Threat ManagementAntivirusAvoiding DowntimePasswordComputersData ManagementIT SolutionsSocialTech SupportBig DataTelephone SystemsHard DrivesEncryptionOneNoteGovernmentBandwidthOffice TipsCustomer Relationship ManagementVPNHumorWebsiteUnsupported SoftwareNet NeutralityShortcutCloud ComputingWi-FiPrinterOutlookNetworkingVulnerabilityGmailUSBGoogle DrivePowerPointAnalyticsBudgetSocial NetworkingArtificial IntelligenceProactive ITFirewallPhone SystemAutomationLithium-ion batteryCurrent EventsTwo-factor AuthenticationWirelessUpdateManaged IT ServicesExcelDisasterWork/Life BalanceEducationTelevisionTravelRetailMobile DevicePoliticsApplicationsSocial EngineeringIT COnsultantBlockchainComputer RepairStreaming MediaInformationRecoveryManaged ITTrendingAuditVirusPersonal InformationIntranetLaptopAugmented RealityadministrationContent FilteringIdentity TheftSave TimePrinter ServerComputer CareFraudGoogle DocsProgramminghackerTwitterHosted SolutionBusiness TechnologyBusiness IntelligenceWindows 8DisplayMeetingsCustomer ServiceWireless ChargingLegalAmazonTelephonyTransportationPaperless OfficeAccess ControlBiometricsCommerceEnd of SupportMobile SecurityVirtual RealityData BreachFlexibilityPrivate CloudFax ServerProject ManagementCortanaHIPAAInternet ExlporerEvernoteComputingHuman ResourcesData StorageScamDDoSInstant MessagingEmailsSportsEntertainmentBenefitsWannaCryComputer AccessorieseWasteTouchscreenData ProtectionWordGoogle AssistantValueSamsungOnline CurrencySaaSBatteryUninterrupted Power SupplySalesHard DriveHaaSManaged ServiceDevicesAutomobileCleaningManaging StressStoragePoint of SalePatch ManagementData LossReputationAccessoryBloggingSharePointWebsitesTutorialUserWireless InternetFAQfilterWorker CommuteAdministratorEmployee-Employer RelationshipVirtual DesktopPresentationSolid State DriveSyncSettingsKeyboardPeripheralTeamworkData TheftBest AvailableGamificationScienceChargerDebateVideo GamesHelp DeskAccessCo-managed ITEdgeHard Disk DriveMicrosoft ExcelHiring/FiringApp storeMemoryTestingBuisnessCiminalAdobeFile SharingSmart TechnologyOneDriveRunning CablePrint ServerFinancialRobotCameraAdminNear Field CommunicationLifestyleAdvertisingEbayIdentityHybrid CloudScalabilityExperienceData storageProjectsIT budgetKeyboard ShortcutsIT consultingiOSLicensingLegislationPDFData PrivacyVirtual AssistantWorkersUpgradesHow ToMusicWindows 7PayrollReliable ComputingComputer FanTabletsScreen MirroringComparisonComplianceEmployer Employee RelationshipText MessagingDistributed Denial of ServiceChromebook3D PrintingAlexa for BusinessBloatwareUpdatesConsultantHBOBooksTouchpadCo-Managed ServicesIdentitiesSecurity CamerasSurge ProtectorNokiaNFLPrintingCastGift GivingSpecificationsInbound MarketingFilesMicrosoft WordYoutubeBlack MarketElectronic Medical RecordsTelephoneBrandingLanguageMachine LearningMonitorsMouseConferencingMicrobloggingChromecastSoftware as a ServiceDevice SecurityWebinarIT ManagementWindows InkSafetyOperating SysytemHyperlinkWIndows 7NanotechnologyComputer ForensicsNetwork CongestionGiftsTrainingCommunityRegulationsIT solutionsWIndows Server 2008Google MapsISPWasting TimeBluetoothProactiveRoot Cause AnalysisManagementCredit CardsjunkCompany CultureWebinarIntrantetImagesVendorSpywareCamerasWindows 10s