Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Powerful Physical Security Options

Powerful Physical Security Options

Data security isn’t the easiest thing in the world to plan for, especially if your organization doesn’t have any dedicated security professionals on-hand. While protecting your data with traditional methods, like passwords, firewalls, and antivirus, is important, what measures are you taking to make sure a thief or hacker isn’t just walking into your office and making off with your technology?

Continue reading
0 Comments

Why Your Google Account’s Security is So Important

Why Your Google Account’s Security is So Important

These days, it seems that to have a computer is to have a Google account. If one isn’t used for professional purposes, it is used as a personalized solution - and no wonder. The convenience and accessibility of these accounts alone are compelling, even before one considers the versatility that this account brings with it. Unfortunately, these benefits can be quickly overshadowed by risk if a Google account’s security is overlooked, even if unintentionally.

Continue reading
0 Comments

How the Grinch Didn’t Send that Email!

How the Grinch Didn’t Send that Email!

An email’s important,
That much is clear fact -
But you need to stay safe
From an email attack.

Continue reading
0 Comments

Don’t Get Scammed with Gift Cards

Don’t Get Scammed with Gift Cards

It’s the holiday season, and shoppers are flocking to stores to find the perfect gift for anyone: the gift card. However, these handy little plastic rectangles may not be so perfect after all. This year, they’ve been a key component to a business email compromise scam that has been popular in the past few months.

Continue reading
0 Comments

Those Irritating Spam Calls May Not Last Much Longer

Those Irritating Spam Calls May Not Last Much Longer

While the phone is still a useful communication tool, it lately has been the cause of a large amount of stress from businesses and users alike. While caller ID was once also a useful tool to help stop spam calls, we now cannot trust the numbers it provides. Letting personal calls go to voicemail to check them is one thing, but a business shouldn’t do that. What can they do?

Continue reading
0 Comments

Setting Android’s Security Options

Setting Android’s Security Options

You might be shocked to find out that your mobile device holds a considerable amount of personally identifiable information on it. This has prompted many users to secure their phones at all times, but others simply ignore the threat and brush it aside. Since Google makes it so easy, there’s no excuse for Android users not to secure their devices. Here’s how you can do it.

Recent comment in this post
JamesLGreen
I learn many things from this post about the security options of android and it was great for me. If you want to buy research pape... Read More
Friday, 14 December 2018 05:37
Continue reading
1 Comment

Bing Offers Malware and Filth

Bing Offers Malware and Filth

With a meager market share that is one-third the size of Google’s, one would think that Bing would be trying to keep controversy away from a user’s search results. However, the Microsoft search engine has recently encountered a few notable PR disasters that may be enough to convince some not to use it - especially if it leads to a security breach.

Continue reading
0 Comments

The Internet of Things Continues to Expand

The Internet of Things Continues to Expand

The Internet of Things is now made up of over 15 billion devices. 15 billion. This number includes both consumer devices in a home environment as well as business devices that are typically used in an office setting. As such, you cannot risk ignoring this phenomenon, whether it’s from a security standpoint or one of practicality. We’ll discuss the many ways the IoT is shaping business practices in today’s modern office.

Continue reading
0 Comments

Is It Safe to Have Your Browser Remember Your Passwords?

Is It Safe to Have Your Browser Remember Your Passwords?

Let’s be honest - not all of us have the best memories. This makes the ability for many browsers to remember our passwords seem like a godsend. However, is this capability actually a good thing for your cybersecurity? The answer may not surprise you.

Continue reading
0 Comments

Tip of the Week: How to Spot a Scam

Tip of the Week: How to Spot a Scam

What would you do if you sat down at your desk one morning, coffee still kicking in, to discover a pop-up message on your computer announcing that Microsoft has detected a fatal issue with your workstation, and if they aren’t allowed to remote in and fix it, the entire network could be at risk? Would you be able to, in the heat of the moment, recognize it for the scam that it is and disregard it?

Continue reading
0 Comments

Getting to Know Technology: Hackers

Getting to Know Technology: Hackers

It doesn’t matter how much of a technology novice someone is, chances are, they’ve heard the term “hacker” before. A favorite character trope of Hollywood films and television dramas, these cybercriminals have appeared in productions like Die Hard and Mr. Robot with varying degrees of accuracy. Below, we explore what makes a hacker, and the kinds that exist in reality.

Continue reading
0 Comments

Would You Fall for this Adult Scam if You Saw an Old Password?

Would You Fall for this Adult Scam if You Saw an Old Password?

As you may expect, the average Internet scammer isn’t above resorting to dirty tricks to claim their ill-gotten prize from their victims. A recent scam demonstrates just how dirty these tricks can truly be, and unfortunately, how ill-prepared many are to handle them.

Continue reading
0 Comments

The Blockchain May Soon Protect Your Entire Identity

The Blockchain May Soon Protect Your Entire Identity

Blockchain is one of the latest and greatest developments to come in computing. The spotlight is on Bitcoin, Ether, Litecoin, Dogecoin, and several other cryptocurrencies that take advantage of the blockchain, but it’s important to remember that it’s not exclusive to cryptocurrencies. In fact, it has several great uses, with some of the most important being cyber security, transparency, and privacy.

Continue reading
0 Comments

Despite Blockchain Security, Cryptocurrency Has Thieves Too

Despite Blockchain Security, Cryptocurrency Has Thieves Too

Cryptocurrencies are still one of the better known uses of blockchain technology, and though their values seem to have leveled off since the explosive growth they experienced a few months ago, that has not stopped people from seeking them out. Of course, where there’s money to be had, you’re sure to find cybercriminals.

Continue reading
0 Comments

Maybe You Can’t Fix Stupid, but You Can Fix Your Security

Maybe You Can’t Fix Stupid, but You Can Fix Your Security

It’s easy to dismiss network security if you run a small business that seemingly isn’t a target of malicious attacks. Unfortunately, this dismissive attitude can put your organization at risk, as even a simple security issue could be enough to expose your company to dangerous entities. In fact, we would call it foolish not to secure your organization; and one of the most infamous security failings in history stems from this.

Continue reading
0 Comments

Sorry Han, When it Comes to Security, You Need to Know the Odds

Sorry Han, When it Comes to Security, You Need to Know the Odds

Star Wars is a cultural phenomenon. For the past 40+ years audiences from all around the world have become enthralled with the characters, the story, and the technology that existed a long time ago in a galaxy far, far away. Who knew that it was also a wonderful lesson in modern IT security?For today’s blog, we look at three situations that happened in Star Wars: A New Hope; and, how, if proper IT strategies were put in place, the Empire would have been able to protect its greatest asset.

Continue reading
0 Comments

The Single Greatest Defense Against Ransomware

The Single Greatest Defense Against Ransomware

In 2017, ransomware became a huge threat for businesses, so when discussing how nefarious actors will be leveraging new ransomware streams in 2018, you have to do so with some urgency. Today we will provide some information on ransomware, the current trends, and some trends you have to be very mindful of going forward.

Continue reading
0 Comments

FREE Printout: Dos and Don’ts of IT Security

FREE Printout: Dos and Don’ts of IT Security

The following guide is designed to be used by business owners and office managers as an educational resource to establish some basic IT security best practices in the workplace. Feel free to print it out and hand it out or post it in common areas.

Continue reading
0 Comments

Can You Spot the Signs of a Malicious Link?

Can You Spot the Signs of a Malicious Link?

The Internet is notorious for being a minefield of threats, many of which lurk hidden behind innocent-looking links. In order to go about business safely, you need to be able to identify which links you can click; and, which should be skipped.

Continue reading
0 Comments

How to Avoid the Pitfalls of Public Wi-Fi

How to Avoid the Pitfalls of Public Wi-Fi

Someday, you’re going to encounter a situation where you absolutely need Wi-Fi and the only option will be a public connection. This becomes rather problematic, as a public Wi-Fi connection is far from secure for business purposes. A method to maximize productivity without compromising security is needed for every business that has employees working out of the office, but what’s the best way to do it?

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

SecurityTip of the WeekTechnologyBest PracticesPrivacyInternetCloudMicrosoftSoftwareBusiness ComputingBusiness ManagementGoogleEfficiencyHackersProductivityHosted SolutionsBackupManaged Service ProviderUser TipsBusinessInnovationWorkplace TipsMalwareMobile DevicesIT ServicesComputerHardwarewindowsUpgradeNetwork SecurityIT SupportSaving MoneyMiscellaneousEmailWindows 10VirtualizationDataSmartphonesCommunicationSmartphoneAppsBusiness ContinuityGadgetsVoIPDisaster RecoveryProductivityMicrosoft OfficeServerMobile Device ManagementNetworkBrowserMobile ComputingInformation TechnologyTech TermSmall BusinessQuick TipsAndroidPasswordsHealthSocial MediaGoing GreenHolidayOperating SystemData BackupMobile OfficeCybersecurityChromeBest PracticeCollaborationspamSave MoneyCybercrimecommunicationsAppOffice 365ApplicationOfficeAlertEmployer-Employee RelationshipBYODLaw EnforcementMarketingManaged IT ServicesWindows 10Data RecoveryOutsourced ITRansomwareData SecurityTabletRemote ComputingSearchWearable TechnologyThe Internet of ThingsAppleUsersVendor ManagementInternet of ThingsWiFiRemote MonitoringBring Your Own DeviceMobilityAntivirusUnified Threat ManagementAvoiding DowntimeiPhoneRisk ManagementCost ManagementIT SupportMoneyHackingMaintenanceSaving TimeRouterPhishingWireless TechnologyBDRHistoryFacebookUser ErrorBandwidthHard DrivesOffice TipsPasswordIT SolutionsTech SupportBig DataData ManagementComputersEncryptionSocialTelephone SystemsCustomer Relationship ManagementOneNoteGovernmentBudgetLithium-ion batteryCurrent EventsPhone SystemAutomationWirelessVPNHumorTwo-factor AuthenticationWebsiteUpdateNet NeutralityUnsupported SoftwarePrinterSocial NetworkingCloud ComputingWi-FiShortcutOutlookVulnerabilityGmailUSBPowerPointNetworkingAnalyticsGoogle DriveProactive ITFirewallArtificial IntelligenceAuditManaged ITIntranetRecoveryLaptopBlockchainAugmented RealityContent FilteringIdentity TheftManaged IT ServicesInformationIT COnsultantEducationTelevisionWork/Life BalanceRetailExcelComputer RepairMobile DevicePoliticsTravelVirusadministrationSocial EngineeringStreaming MediaDisasterTrendingApplicationsOnline CurrencyTouchscreenCortanaEvernoteSportsEntertainmentWindows 8SamsungBenefitseWasteBatteryComputer AccessoriesPersonal InformationSaaSAutomobileValueCleaningPoint of SalePrinter ServerHaaSSave TimeData ProtectionProgrammingManaging StressTwitterComputer CareWordStorageGoogle AssistanthackerDisplayAmazonPaperless OfficeDevicesManaged ServiceLegalHosted SolutionTransportationFax ServerCommercePatch ManagementEnd of SupportBusiness IntelligenceMeetingsFlexibilityTelephonyCustomer ServiceComputingFraudBiometricsUninterrupted Power SupplySalesGoogle DocsHard DrivePrivate CloudVirtual RealityBusiness TechnologyData StorageScamHIPAAWireless ChargingInternet ExlporerAccess ControlHuman ResourcesMobile SecurityDDoSWannaCryData BreachInstant MessagingEmailsProject ManagementDistributed Denial of ServiceBlack MarketComplianceIdentityDebateHelp DeskMonitorsElectronic Medical RecordsBloatwareHybrid CloudProjectsIT budgetKeyboard ShortcutsLicensingInbound MarketingData PrivacyWebinarLegislationCommunityNanotechnologyWorkersFilesSafetyOperating SysytemVirtual AssistantISPWindows 7PayrollTrainingTabletsBrandingIntrantetMouseChromebookIT solutionsComparisonRoot Cause AnalysisUpdatesChromecastHBOAlexa for BusinessWIndows 7Co-Managed ServicesLifestyleBloggingIdentitiesSecurity CamerasTutorialCompany CultureNFLNetwork CongestionPrintingWindows 10sSpecificationsMicrosoft WordReputationRegulationsTelephoneLanguageMachine LearningBluetoothWorker CommuteAdministratorjunkSolid State DriveConferencingCo-managed ITSettingsDevice SecurityKeyboardIT ManagementCamerasSoftware as a ServiceUserHyperlinkWindows InkSharePointVideo GamesAccessfilterComputer ForensicsHard Disk DriveGiftsNokiaHiring/FiringWIndows Server 2008Virtual DesktopPresentationOneDriveBest AvailableWasting TimeGift GivingProactivePrint ServerGoogle MapsTeamworkScienceManagementYoutubeCredit CardsSpywareSmart TechnologyVendorAccessoryEbayWebsitesMicrobloggingData LossRobotWireless InternetFAQEmployee-Employer RelationshipSyncBuisnessAdvertisingPeripheralData TheftRunning CableScalabilityChargerExperienceData storageGamificationiOSEdgePDFNear Field CommunicationApp storeWebinarUpgradesMicrosoft ExcelImagesHow ToComputer FanMusic3D PrintingMemoryTestingScreen MirroringCiminalSurge ProtectorEmployer Employee RelationshipAdobeText MessagingIT consultingConsultantFile SharingBooksTouchpadFinancialCameraCastAdminReliable Computing