Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Could Your Router be Infected with Malware?

Could Your Router be Infected with Malware?

Certain threats out there are dangerous enough to cause major entities to warn against them. In particular, a recent malware by the name of VPNFilter has been deemed dangerous and prevalent enough that the FBI has addressed it. Since the malware targets routers (probably not your first guess in terms of possible vulnerabilities), it has considerable potential to become a nuisance for your organization.

Continue reading
0 Comments

Has Malware Made a Home in Your Router?

Has Malware Made a Home in Your Router?

Hackers and cybercriminals, like most people, tend to gravitate towards high-reward activities. In this case, that means that focus is turning to creating malware that attacks the router, potentially infecting the users that leverage it to connect wirelessly to the Internet. Researchers at Kaspersky Lab recently discovered an example of such a malware, so today, we will review this threat and how to best protect your network.

Continue reading
0 Comments

Tip of the Week: 4 Steps to Troubleshoot a Weak Wi-Fi Signal

Tip of the Week: 4 Steps to Troubleshoot a Weak Wi-Fi Signal

Your wireless router is critical to your business’s online infrastructure and provides your team with precious wireless Internet connections throughout the office. You need to ensure that the signal can reach your entire office. Here are some tips to help you figure out where to put your router, and to ensure that its signal is as strong as possible throughout your office.

Continue reading
0 Comments

The Legendary Router Malware

b2ap3_thumbnail_router_protection_400.jpgWhen diagnosing your computer's security problems, it should be noted that malware is not always located on the PC itself. A lot of the time, problems could be occurring in a number of different operating systems and browsers, making it difficult to diagnose the cause. A recent study by Ronald Kaplan and Dylan Kaplan proved that malware can be located not only on your computer and devices, but even on your wireless router.

Continue reading
0 Comments

Have You Experienced Internet Troubles Lately?

b2ap3_thumbnail_internet_speed_slow_400.jpgYou may have noticed last week that the Internet was having some trouble with its operating speeds, but now we know for sure why. The root of the problem lies in Tier 1's Internet routers' Border Gateway Protocol routing tables, which have exceeded their maximum size, and has brought about the failure of these routers to operate at maximum speed. 

Continue reading
0 Comments

3 New Wireless Security Solutions that Don’t Require Passwords

b2ap3_thumbnail_wireless_security_400.jpgIs your wireless router an older model? If it is, then you owe it to yourself to upgrade the latest model. Depending on your Internet connection, upgrading your wireless router may be the easiest way to increase your bandwidth. Next-gen routers also come with new easy-to-use security features that don't require passwords, making an upgrade worth the effort.

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

SecurityTip of the WeekTechnologyBest PracticesPrivacyInternetCloudMicrosoftBusiness ComputingSoftwareHackersGoogleEfficiencyBusiness ManagementInnovationProductivityHosted SolutionsBackupUser TipsWorkplace TipsManaged Service ProviderMalwareBusinessMobile DevicesNetwork SecurityProductivityIT ServicesHardwareComputerwindowsUpgradeCommunicationEmailDataIT SupportMiscellaneousSaving MoneyGadgetsSmartphonesVirtualizationWindows 10SmartphoneAppsDisaster RecoverySmall BusinessBusiness ContinuityNetworkVoIPServerBrowserMicrosoft OfficeMobile Device ManagementMobile ComputingInformation TechnologyTech TermAndroidHealthSocial MediaQuick TipsPasswordsCybersecurityWindows 10Going GreenOffice 365HolidayOperating SystemData BackupMobile OfficeData RecoverySave MoneycommunicationsOfficeChromeBest PracticeBYODspamOutsourced ITCollaborationCybercrimeApplicationUsersInternet of ThingsAppEmployer-Employee RelationshipAlertData SecurityMarketingSearchLaw EnforcementManaged IT ServicesRansomwareIT SupportBring Your Own DeviceTabletRemote ComputingWearable TechnologyPhishingWirelessThe Internet of ThingsAppleVendor ManagementWiFiFacebookRemote MonitoringAutomationUnified Threat ManagementAntivirusiPhoneAvoiding DowntimeRisk ManagementCost ManagementHackingMobilityMaintenanceSaving TimeRouterWireless TechnologyBDRHistoryMoneyUser ErrorBandwidthOffice TipsHard DrivesPasswordArtificial IntelligenceComputersIT SolutionsData ManagementTech SupportSocialBig DataTelephone SystemsEncryptionCustomer Relationship ManagementOneNoteGovernmentCloud ComputingPhone SystemWi-FiLithium-ion batteryVulnerabilityCurrent EventsTwo-factor AuthenticationUpdateVPNGoogle DriveInformationHumorWebsiteNet NeutralityEducationShortcutSocial NetworkingPrinterOutlookNetworkingGmailUSBManaged IT ServicesPowerPointAnalyticsUnsupported SoftwareProactive ITFirewallBudgetRecoveryAuditMobile DeviceIntranetPoliticsAugmented RealityLaptopBlockchainContent FilteringIT COnsultantWordExcelComputer RepairTelevisionManaged ITRetailManaged ServiceMeetingsPaperless OfficeTravelBatteryTelephonyPersonal InformationVirusSocial EngineeringadministrationIdentity TheftDisasterEntertainmentWork/Life BalanceStreaming MediaTrendingApplicationsOnline CurrencyCortanaTransportationEnd of SupportHybrid CloudEvernoteCommerceValueFlexibilitySaaSHaaSPoint of SaleManaging StressData StorageScamPrinter ServerStoragePrintingData ProtectionTwitterProgrammingGoogle AssistantConferencingWannaCryIT ManagementTouchscreenHosted SolutionDisplayAmazonBusiness IntelligenceSamsungDevicesYoutubeCustomer ServiceOneDriveBiometricsPatch ManagementFax ServerVirtual RealityAutomobilePrivate CloudComputingUninterrupted Power SupplySalesHard DriveCleaningHIPAAFraudGoogle DocsInternet ExlporerHuman ResourcesSave TimeComputer CareBusiness TechnologyDDoSInstant MessagingEmailshackerWireless ChargingAccess ControlMobile SecurityFile SharingSportsBenefitsData BreachLegaleWasteProject ManagementComputer AccessoriesWindows 8Identity5GFilesBrandingSmart TechnologyLicensingProjectsIT budgetKeyboard ShortcutsMouseData PrivacyEmployeesLegislationRobotChromecastAdvertisingVirtual AssistantCommunityWorkersWIndows 7TabletsScalabilityISPWindows 7PayrollNetwork CongestionChromebookVoice over Internet ProtocolLifestyleComparisonRegulationsiOSExperienceIntrantetData storagePDFAlexa for BusinessBluetoothUpdatesHBOTutorialNFLjunkUpgradesHow ToCo-Managed ServicesBloggingIdentitiesSecurity CamerasSabotageSpecificationsCamerasComputer FanMusicEmployer Employee RelationshipText MessagingSharePointMicrosoft WordUserScreen MirroringfilterConsultantTelephoneLanguageMachine LearningTouchpadPCVirtual DesktopPresentationBooksSoftware as a ServiceTeamworkCo-managed ITDevice SecurityBest AvailableCastDowntimeScienceNokiaWindows InkBlack MarketHyperlinkComputer ForensicsSmartwatchGift GivingGiftsMonitorsElectronic Medical RecordsWIndows Server 2008ProactiveE-CommercePrint ServerGoogle MapsWebinarWasting TimeOperating SysytemManagementServer MaintenanceBuisnessCredit CardsMicrobloggingNanotechnologySafetyTrainingVendorRunning CableSpywareEbayWebsitesPayment CardsData LossIT solutionsAccessoryWireless InternetInvestmentFAQNear Field CommunicationRoot Cause AnalysisSyncCompany CultureEmployee-Employer RelationshipData TheftEmployeeWindows 10sPeripheralReputationGamificationROIChargerIT consultingWebinarImagesEdgeApp storeBreak/FixMicrosoft ExcelSolid State DriveWorker CommuteAdministrator3D PrintingMemoryReliable ComputingSettingsKeyboardSurge ProtectorAdobeComplianceVideo GamesTestingDistributed Denial of ServiceCiminalMedical ITBloatwareHard Disk DriveAccessFinancialDebateHelp DeskHiring/FiringInbound MarketingCameraAdmin