Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

IoT Security is a Key Business Concern

IoT Security is a Key Business Concern

The Internet of Things is everywhere, which means that potential security risks are also everywhere. Your business needs to take the risks presented by the IoT into account and prepare accordingly.

Continue reading
0 Comments

Are Shortcuts Sabotaging Your Progress?

Are Shortcuts Sabotaging Your Progress?

When your organization is implementing a new project, there are a lot of expectations and deadlines that are watched with a close eye. While it might be ideal to get the project finished as quickly as possible, doing so can put a lot of pressure and stress on it that can ultimately be its downfall. For example, if you don’t think out the planning phase carefully, the entire implementation process can suffer--particularly when working on new IT initiatives.

Continue reading
0 Comments

Tip of the Week: Why You Should Think Twice Before Connecting to Public Wi-Fi

Tip of the Week: Why You Should Think Twice Before Connecting to Public Wi-Fi

Wireless Internet signals, referred to most commonly as Wi-Fi, are commonplace in every office. Even organizations that don’t often need access to the Internet, like restaurants and coffee shops, have wireless connections available for customers to use. However, just because you can connect to free Wi-Fi, doesn’t necessarily mean that you should.

Continue reading
0 Comments

Use This Test to Calculate Your Employees’ Risk Levels

b2ap3_thumbnail_risk_for_employers_400.jpgWhen it comes to your business’s data security, there can be no room for error. October is Cyber Security Month, so there’s no better time to ensure that your business is taking all of the proper precautions to maximize security protocol. However, there’s an often-forgotten aspect of cybersecurity called employee risk management, and it’s more complex than you might think.

Continue reading
0 Comments

2 of the Biggest Risks Associated with BYOD

b2ap3_thumbnail_bring_your_own_device_policy_400.jpgOne of the most popular business technology trends that we're seeing is employees bringing their own devices into the workplace (BYOD). This trend is due to the popularity of mobile devices (owned by over half of all U.S. adults). While this trend benefits companies in many ways like enhancing mobility, implementing BYOD for a business is not without risks.

Continue reading
0 Comments

Use the 80/20 Rule to Save on Data Backup Costs

b2ap3_thumbnail_8020-400.jpgBacking up your company's data is critical when it comes to keeping operations going after a disaster. Data backup is an important operating expense that you can't afford to skip out on, but if you're looking to cut back on the cost of your data backup service, then you should consider the 80/20 Rule.

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Cloud Internet Microsoft Software Business Computing Google Business Management Hackers Efficiency Productivity Hosted Solutions User Tips Innovation Backup Managed Service Provider Malware Business Workplace Tips Mobile Devices IT Services Computer Hardware windows Upgrade Network Security Communication IT Support Miscellaneous Saving Money Email Productivity Smartphones Data Virtualization Windows 10 Gadgets Smartphone Business Continuity Apps VoIP Disaster Recovery Server Browser Mobile Device Management Microsoft Office Small Business Network Social Media Information Technology Tech Term Mobile Computing Quick Tips Passwords Health Android Cybersecurity Data Backup Holiday Going Green Operating System Mobile Office Chrome Save Money Windows 10 Office 365 Collaboration spam Outsourced IT App Cybercrime Alert Best Practice communications Application Office Users Employer-Employee Relationship Law Enforcement BYOD Managed IT Services Marketing Data Security Search Data Recovery Internet of Things Ransomware Apple Vendor Management WiFi Bring Your Own Device Remote Computing Tablet The Internet of Things Facebook Wearable Technology Mobility History Avoiding Downtime iPhone IT Support Money Router Risk Management Wireless Technology Hacking Cost Management BDR Maintenance Phishing Saving Time User Error Remote Monitoring Antivirus Unified Threat Management Automation IT Solutions Tech Support Office Tips Big Data Hard Drives Password Cloud Computing Encryption Data Management Computers OneNote Government Social Telephone Systems Bandwidth Customer Relationship Management Budget VPN Humor Phone System Website Net Neutrality Wireless Two-factor Authentication Printer Update Unsupported Software Outlook Gmail Wi-Fi USB Information Vulnerability Shortcut PowerPoint Analytics Social Networking Proactive IT Firewall Networking Google Drive Lithium-ion battery Artificial Intelligence Current Events Content Filtering Entertainment Disaster Personal Information Recovery Applications Identity Theft Managed IT Services Education Television Retail Work/Life Balance Blockchain Excel IT COnsultant Mobile Device Politics Computer Repair Meetings Travel Streaming Media Trending Virus Audit Social Engineering Intranet administration Laptop Managed IT Augmented Reality Samsung Battery Business Technology Sports Point of Sale Printer Server Benefits eWaste Wireless Charging Computer Accessories Automobile Mobile Security Programming Cleaning Twitter Windows 8 Value SaaS Data Breach Project Management Cortana Save Time Display Hybrid Cloud HaaS Evernote Computer Care Amazon Paperless Office Managing Stress hacker Storage Fax Server Computing Legal Transportation Commerce End of Support Hosted Solution Data Protection Flexibility Word Business Intelligence Google Assistant Conferencing Telephony Customer Service IT Management Biometrics Data Storage Scam Access Control Managed Service Private Cloud Devices Virtual Reality Online Currency HIPAA Uninterrupted Power Supply Sales Hard Drive Internet Exlporer Patch Management WannaCry Human Resources DDoS Emails Fraud Touchscreen Instant Messaging Google Docs Gamification Intrantet Distributed Denial of Service Charger Compliance Payroll Edge Webinar Bloatware App store Nanotechnology Microsoft Excel Safety Blogging Operating Sysytem Tutorial Memory Training Inbound Marketing Adobe Security Cameras Debate Testing Help Desk Files Ciminal IT solutions Root Cause Analysis Branding File Sharing Financial Company Culture Mouse Machine Learning Co-managed IT Camera Chromecast Windows 10s Identity WIndows 7 Reputation Network Congestion Licensing Downtime Worker Commute Regulations Administrator Projects IT budget Solid State Drive Data Privacy Settings OneDrive Bluetooth Legislation Keyboard Print Server Lifestyle junk Virtual Assistant Workers Video Games Tablets E-Commerce Cameras Access Windows 7 Hard Disk Drive Chromebook SharePoint Comparison Hiring/Firing Ebay User filter Alexa for Business Updates HBO Virtual Desktop NFL Payment Cards Presentation Co-Managed Services Identities Printing Teamwork Specifications Smart Technology Best Available Microsoft Word Science Employee Robot Telephone Language Advertising Nokia Scalability Gift Giving Software as a Service Device Security 3D Printing iOS Buisness Windows Ink Break/Fix Experience Data storage Surge Protector Youtube Hyperlink Computer Forensics Running Cable Gifts PDF How To Microblogging Upgrades WIndows Server 2008 Computer Fan Google Maps Medical IT Music Near Field Communication Wasting Time Proactive Management Screen Mirroring Credit Cards Employer Employee Relationship Text Messaging Admin Vendor Spyware Consultant Data Loss Books IT consulting Touchpad Accessory Websites Wireless Internet Cast FAQ Keyboard Shortcuts Black Market Community Webinar Employee-Employer Relationship Images Sync Monitors ISP Electronic Medical Records Reliable Computing Peripheral Data Theft