Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

IoT Security is a Key Business Concern

IoT Security is a Key Business Concern

The Internet of Things is everywhere, which means that potential security risks are also everywhere. Your business needs to take the risks presented by the IoT into account and prepare accordingly.

Continue reading
0 Comments

Are Shortcuts Sabotaging Your Progress?

Are Shortcuts Sabotaging Your Progress?

When your organization is implementing a new project, there are a lot of expectations and deadlines that are watched with a close eye. While it might be ideal to get the project finished as quickly as possible, doing so can put a lot of pressure and stress on it that can ultimately be its downfall. For example, if you don’t think out the planning phase carefully, the entire implementation process can suffer--particularly when working on new IT initiatives.

Continue reading
0 Comments

Tip of the Week: Why You Should Think Twice Before Connecting to Public Wi-Fi

Tip of the Week: Why You Should Think Twice Before Connecting to Public Wi-Fi

Wireless Internet signals, referred to most commonly as Wi-Fi, are commonplace in every office. Even organizations that don’t often need access to the Internet, like restaurants and coffee shops, have wireless connections available for customers to use. However, just because you can connect to free Wi-Fi, doesn’t necessarily mean that you should.

Continue reading
0 Comments

Use This Test to Calculate Your Employees’ Risk Levels

b2ap3_thumbnail_risk_for_employers_400.jpgWhen it comes to your business’s data security, there can be no room for error. October is Cyber Security Month, so there’s no better time to ensure that your business is taking all of the proper precautions to maximize security protocol. However, there’s an often-forgotten aspect of cybersecurity called employee risk management, and it’s more complex than you might think.

Continue reading
0 Comments

2 of the Biggest Risks Associated with BYOD

b2ap3_thumbnail_bring_your_own_device_policy_400.jpgOne of the most popular business technology trends that we're seeing is employees bringing their own devices into the workplace (BYOD). This trend is due to the popularity of mobile devices (owned by over half of all U.S. adults). While this trend benefits companies in many ways like enhancing mobility, implementing BYOD for a business is not without risks.

Continue reading
0 Comments

Use the 80/20 Rule to Save on Data Backup Costs

b2ap3_thumbnail_8020-400.jpgBacking up your company's data is critical when it comes to keeping operations going after a disaster. Data backup is an important operating expense that you can't afford to skip out on, but if you're looking to cut back on the cost of your data backup service, then you should consider the 80/20 Rule.

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

SecurityTip of the WeekTechnologyBest PracticesPrivacyInternetCloudMicrosoftBusiness ComputingHackersSoftwareGoogleEfficiencyBusiness ManagementInnovationProductivityHosted SolutionsBackupUser TipsWorkplace TipsManaged Service ProviderMalwareBusinessNetwork SecurityMobile DevicesIT ServicesHardwareProductivityComputerwindowsUpgradeCommunicationEmailDataIT SupportMiscellaneousSaving MoneyGadgetsSmartphonesVirtualizationWindows 10SmartphoneAppsDisaster RecoverySmall BusinessNetworkBusiness ContinuityVoIPServerBrowserMicrosoft OfficeMobile Device ManagementMobile ComputingInformation TechnologyTech TermHealthAndroidSocial MediaQuick TipsPasswordsData BackupCybersecurityGoing GreenHolidayWindows 10Data RecoveryOperating SystemMobile OfficeOffice 365Save MoneycommunicationsChromeOfficeInternet of ThingsAlertEmployer-Employee RelationshipBest PracticeBYODCollaborationspamOutsourced ITCybercrimeUsersAppApplicationRansomwareLaw EnforcementMarketingManaged IT ServicesSearchIT SupportData SecurityBring Your Own DeviceWirelessTabletRemote ComputingWearable TechnologyPhishingAppleVendor ManagementWiFiThe Internet of ThingsFacebookMobilityUser ErrorRemote MonitoringAntivirusUnified Threat ManagementiPhoneAutomationAvoiding DowntimeRisk ManagementCost ManagementMoneyMaintenanceSaving TimeHackingRouterWireless TechnologyHistoryBDRBandwidthHard DrivesOffice TipsCloud ComputingPasswordIT SolutionsTech SupportData ManagementBig DataComputersCustomer Relationship ManagementEncryptionSocialTelephone SystemsArtificial IntelligenceOneNoteGovernmentFirewallLithium-ion batteryBudgetPhone SystemCurrent EventsManaged IT ServicesVPNTwo-factor AuthenticationUnsupported SoftwareHumorWebsiteNet NeutralityUpdateSocial NetworkingWi-FiEducationPrinterVulnerabilityInformationShortcutOutlookGmailUSBGoogle DrivePowerPointNetworkingAnalyticsProactive ITTrendingBatteryAuditEntertainmentPersonal InformationIntranetRecoveryLaptopAugmented RealityIdentity TheftContent FilteringApplicationsIT COnsultantComputer RepairWork/Life BalanceBlockchainTelevisionExcelRetailPaperless OfficeMobile DevicePoliticsVirusWordMeetingsTelephonyadministrationTravelManaged ServiceSocial EngineeringDisasterStreaming MediaManaged ITInstant MessagingSamsungEmailsFraudGoogle DocsOnline CurrencySportsBusiness TechnologyBenefitsAutomobileComputer AccessoriesCleaningWireless ChargingeWasteMobile SecurityFile SharingSave TimeValueData BreachSaaSProject ManagementComputer CarePoint of SaleCortanaPrinter ServerhackerHybrid CloudEvernoteHaaSTwitterManaging StressProgrammingAccess ControlStorageLegalYoutubeTransportationDisplayCommerceEnd of SupportAmazonFlexibilityOneDrivePrintingHosted SolutionData ProtectionFax ServerHard DriveUninterrupted Power SupplyBusiness IntelligenceSalesGoogle AssistantConferencingData StorageIT ManagementCustomer ServiceScamComputingBiometricsPrivate CloudVirtual RealityDevicesHIPAAWannaCryInternet ExlporerPatch ManagementData LossHuman ResourcesTouchscreenWindows 8DDoSSyncDowntimeEmployee-Employer RelationshipPeripheralData TheftSmartwatchWebinarReliable ComputingSafetyComplianceOperating SysytemGamificationChargerDistributed Denial of ServiceNanotechnologyEdgeE-CommerceBloatwareTrainingApp storeMicrosoft ExcelServer MaintenanceIT solutionsInbound MarketingMemoryRoot Cause AnalysisCiminalFilesAdobePayment CardsCompany CultureLifestyleTestingCommunityInvestmentBrandingWindows 10sISPMouseIntrantetReputationFinancialChromecastEmployeeCameraAdministratorBloggingIdentityTutorialROISolid State DriveWIndows 7Worker CommuteNetwork CongestionKeyboardSettingsIT budgetLicensingBreak/FixRegulationsVideo GamesProjectsAccessData PrivacyLegislationBluetoothHard Disk DriveHiring/FiringNokiajunkVirtual AssistantWorkersTabletsMedical ITGift GivingCamerasWindows 7Co-managed ITChromebookComparisonSharePointUserHBOAdminSmart TechnologyfilterAlexa for BusinessUpdatesIdentitiesNFL5GVirtual DesktopPresentationMicrobloggingCo-Managed ServicesRobotPrint ServerSpecificationsTeamworkBest AvailableKeyboard ShortcutsScienceAdvertisingMicrosoft WordLanguageEmployeesScalabilityTelephoneExperienceData storageEbayiOSPayrollPDFSoftware as a ServiceDevice SecurityImagesWindows InkVoice over Internet ProtocolBuisnessUpgradesHow ToWebinarHyperlinkMusicComputer ForensicsGiftsRunning CableComputer FanScreen MirroringWIndows Server 2008Security CamerasEmployer Employee RelationshipText MessagingProactiveGoogle MapsSabotageConsultantNear Field CommunicationWasting TimeBooksTouchpadManagementCredit CardsCastMachine Learning3D PrintingVendorSpywareHelp DeskWebsitesSurge ProtectorPCIT consultingBlack MarketDebateAccessoryElectronic Medical RecordsWireless InternetFAQMonitors