Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

IoT Security is a Key Business Concern

IoT Security is a Key Business Concern

The Internet of Things is everywhere, which means that potential security risks are also everywhere. Your business needs to take the risks presented by the IoT into account and prepare accordingly.

Continue reading
0 Comments

Are Shortcuts Sabotaging Your Progress?

Are Shortcuts Sabotaging Your Progress?

When your organization is implementing a new project, there are a lot of expectations and deadlines that are watched with a close eye. While it might be ideal to get the project finished as quickly as possible, doing so can put a lot of pressure and stress on it that can ultimately be its downfall. For example, if you don’t think out the planning phase carefully, the entire implementation process can suffer--particularly when working on new IT initiatives.

Continue reading
0 Comments

Tip of the Week: Why You Should Think Twice Before Connecting to Public Wi-Fi

Tip of the Week: Why You Should Think Twice Before Connecting to Public Wi-Fi

Wireless Internet signals, referred to most commonly as Wi-Fi, are commonplace in every office. Even organizations that don’t often need access to the Internet, like restaurants and coffee shops, have wireless connections available for customers to use. However, just because you can connect to free Wi-Fi, doesn’t necessarily mean that you should.

Continue reading
0 Comments

Use This Test to Calculate Your Employees’ Risk Levels

b2ap3_thumbnail_risk_for_employers_400.jpgWhen it comes to your business’s data security, there can be no room for error. October is Cyber Security Month, so there’s no better time to ensure that your business is taking all of the proper precautions to maximize security protocol. However, there’s an often-forgotten aspect of cybersecurity called employee risk management, and it’s more complex than you might think.

Continue reading
0 Comments

2 of the Biggest Risks Associated with BYOD

b2ap3_thumbnail_bring_your_own_device_policy_400.jpgOne of the most popular business technology trends that we're seeing is employees bringing their own devices into the workplace (BYOD). This trend is due to the popularity of mobile devices (owned by over half of all U.S. adults). While this trend benefits companies in many ways like enhancing mobility, implementing BYOD for a business is not without risks.

Continue reading
0 Comments

Use the 80/20 Rule to Save on Data Backup Costs

b2ap3_thumbnail_8020-400.jpgBacking up your company's data is critical when it comes to keeping operations going after a disaster. Data backup is an important operating expense that you can't afford to skip out on, but if you're looking to cut back on the cost of your data backup service, then you should consider the 80/20 Rule.

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

SecurityTip of the WeekTechnologyBest PracticesPrivacyInternetCloudMicrosoftSoftwareBusiness ComputingBusiness ManagementHackersGoogleEfficiencyProductivityHosted SolutionsBackupManaged Service ProviderUser TipsWorkplace TipsMalwareBusinessInnovationMobile DeviceswindowsIT ServicesComputerHardwareUpgradeNetwork SecurityIT SupportSaving MoneyEmailMiscellaneousVirtualizationDataSmartphonesWindows 10Business ContinuityGadgetsCommunicationSmartphoneAppsDisaster RecoveryProductivityVoIPNetworkBrowserMicrosoft OfficeServerMobile Device ManagementSmall BusinessMobile ComputingInformation TechnologyTech TermAndroidQuick TipsHealthSocial MediaPasswordsOperating SystemMobile OfficeData BackupCybersecurityGoing GreenHolidayChromeCybercrimecommunicationsAppOfficeOffice 365ApplicationAlertBest PracticeCollaborationspamSave MoneyWindows 10Data RecoveryOutsourced ITRansomwareEmployer-Employee RelationshipBYODMarketingLaw EnforcementManaged IT ServicesAppleThe Internet of ThingsUsersVendor ManagementWiFiInternet of ThingsData SecurityTabletSearchRemote ComputingWearable TechnologySaving TimeHackingRouterWireless TechnologyPhishingBDRHistoryFacebookUser ErrorBring Your Own DeviceRemote MonitoringMobilityAntivirusUnified Threat ManagementiPhoneAvoiding DowntimeRisk ManagementCost ManagementMoneyIT SupportMaintenanceTech SupportComputersBig DataData ManagementEncryptionSocialCustomer Relationship ManagementTelephone SystemsOneNoteGovernmentBandwidthHard DrivesOffice TipsPasswordIT SolutionsWi-FiShortcutOutlookVulnerabilityGmailUSBNetworkingPowerPointAnalyticsGoogle DriveProactive ITFirewallArtificial IntelligenceLithium-ion batteryBudgetCurrent EventsPhone SystemAutomationWirelessVPNTwo-factor AuthenticationHumorWebsiteNet NeutralityUpdateUnsupported SoftwareSocial NetworkingPrinterCloud ComputingVirusMobile DeviceTravelPoliticsadministrationSocial EngineeringDisasterStreaming MediaTrendingApplicationsAuditManaged ITIntranetRecoveryLaptopBlockchainAugmented RealityContent FilteringIdentity TheftInformationIT COnsultantManaged IT ServicesComputer RepairTelevisionEducationRetailExcelWork/Life BalanceTransportationHosted SolutionPatch ManagementEnd of SupportBusiness IntelligenceFax ServerCommerceMeetingsFlexibilityCustomer ServiceUninterrupted Power SupplyComputingSalesHard DriveTelephonyFraudBiometricsGoogle DocsVirtual RealityPrivate CloudData StorageScamBusiness TechnologyHIPAAWireless ChargingInternet ExlporerAccess ControlHuman ResourcesMobile SecurityDDoSInstant MessagingEmailsWannaCryData BreachProject ManagementWindows 8Online CurrencyTouchscreenCortanaSportsEntertainmentEvernoteSamsungBenefitsComputer AccessorieseWasteBatteryPersonal InformationValueSaaSAutomobileCleaningPoint of SalePrinter ServerHaaSSave TimeData ProtectionTwitterComputer CareWordProgrammingManaging StressStorageGoogle AssistanthackerDisplayAmazonManaged ServicePaperless OfficeDevicesLegalScienceManagementMicrobloggingCredit CardsSmart TechnologyVendorSpywareAccessoryEbayWebsitesData LossRobotWireless InternetFAQSyncBuisnessAdvertisingEmployee-Employer RelationshipPeripheralData TheftRunning CableScalabilityData storageGamificationWebinariOSChargerImagesExperienceEdgePDFNear Field CommunicationApp storeUpgradesMicrosoft ExcelHow ToMusic3D PrintingMemoryComputer FanScreen MirroringCiminalSurge ProtectorEmployer Employee RelationshipAdobeText MessagingIT consultingTestingConsultantFile SharingBooksTouchpadFinancialDebateHelp DeskCastAdminReliable ComputingCameraComplianceIdentityDistributed Denial of ServiceBlack MarketElectronic Medical RecordsBloatwareHybrid CloudMonitorsIT budgetKeyboard ShortcutsLicensingProjectsInbound MarketingData PrivacyWebinarLegislationFilesSafetyOperating SysytemVirtual AssistantCommunityNanotechnologyWorkersPayrollTrainingTabletsBrandingISPWindows 7IntrantetMouseLifestyleChromebookIT solutionsComparisonChromecastHBOAlexa for BusinessRoot Cause AnalysisUpdatesBloggingIdentitiesSecurity CamerasTutorialCompany CultureNFLWIndows 7Co-Managed ServicesNetwork CongestionPrintingWindows 10sSpecificationsReputationRegulationsMicrosoft WordLanguageMachine LearningBluetoothTelephoneAdministratorjunkSolid State DriveConferencingWorker CommuteKeyboardIT ManagementCamerasSoftware as a ServiceCo-managed ITSettingsDevice SecurityNokiaWindows InkSharePointVideo GamesUserHyperlinkAccessGift GivingfilterComputer ForensicsHard Disk DriveGiftsHiring/FiringWIndows Server 2008Virtual DesktopPresentationYoutubeProactivePrint ServerGoogle MapsTeamworkOneDriveBest AvailableWasting Time