Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Your Business Needs to Prioritize Network Security

Your Business Needs to Prioritize Network Security

There is one constant in the business environment, and it’s that your organization will be placed in a constant state of being at risk the second you start to make a name for yourself. What a lot of organizations don’t understand is that it doesn’t matter how high or low-profile a business is, there will always be data on a network infrastructure that is valuable to hackers and is targeted by threats.

Continue reading
0 Comments

Fix Any Bit of Data Leakage

Fix Any Bit of Data Leakage

How valuable is the data that you’ve collected during your time in business? What would it mean if it were to leak somewhere beyond your control? Today we’ll discuss ways to control your data leakage.

Continue reading
0 Comments

Network Security a Challenge for Colleges and Universities

Network Security a Challenge for Colleges and Universities

Millions of students--approximately 16 million--call colleges or universities their home for at least a portion of the calendar year. They are educated by another 1.5 million or so faculty, staff, and other employees. Most of these institutions of higher education understand the challenges presented by maintaining networks, particularly the ones that students connect countless devices to. With all this in mind, can a college campus’ network truly be secure, or is it a fool’s errand?

Continue reading
0 Comments

How to Prevent a Virtual Assistant from Compromising Your Security

How to Prevent a Virtual Assistant from Compromising Your Security

Virtual assistants have a lot of promise as a productivity tool, so it only makes sense that they would begin to appear in the workplace. Unfortunately, these devices have also gained a reputation as a security risk. Whether or not you’ve considered bringing virtual assistants into your business, you need to prepare for their presence there.

Continue reading
0 Comments

Understanding Biometrics

Understanding Biometrics

It’s a familiar scene from many science fiction properties: a person approaches a locked door. They unlock it, but rather than using a key, a red beam scans their eye to confirm their identity and permit them access. The thing is, this and similar biometric authentication technologies are likely to begin appearing in real-world businesses sooner than later. Let’s discuss:

Continue reading
0 Comments

How to Make Sure Your Messages are Secure

How to Make Sure Your Messages are Secure

Messaging applications have carved out a foothold in businesses, clearly proving their operational benefits. However, it simply isn’t responsible to leverage a solution without making sure that the solution is secure. There are a few criteria that you should consider to determine how secure your chosen application really is.

Continue reading
0 Comments

Here are 5 Solid IoT Trends for 2019

Here are 5 Solid IoT Trends for 2019

The Internet of Things is simultaneously the most remarkable and the most dangerous current IT trend. This is because it promotes the use of connected devices, while not supplying the integrated security necessary to keep all these new endpoints from stretching an organization’s network security thin. Today, we will look at five trending topics for the IoT, and what they mean for a business like yours.

Continue reading
0 Comments

Down and Out in Cyberspace

Down and Out in Cyberspace

There has been a lot made in the media about the effect that movies and television has had on society. More often than not, the media that is produced is a result of the ebbs and flows that happen in society, which ironically makes the whole notion that television and movies affect society an interesting paradox. The ludicrous portrayal of criminality in media is one issue that is resoundingly debated by lawmakers and sociologists, alike.

Continue reading
0 Comments

What You Should Know About Securing Payment Cards

What You Should Know About Securing Payment Cards

Cards are one of the most common methods of making payments these days, as it’s simply more convenient than carrying a ton of cash on you at any given time. Still, if your business takes card payments, it puts you in a place of vulnerability. Considering how often payment cards are used for transactions, you need to take action now to keep your company from experiencing data breaches related to payment information.

Continue reading
0 Comments

Contemporary Cyber Threats You Should Know

Contemporary Cyber Threats You Should Know

Cybersecurity is a critical part of managing any business. This is especially true nowadays when there are countless individuals and organizations formed specifically to steal credentials and sensitive information from your organization. Today we will be dedicating some time to how your business can reinforce proper cybersecurity practices.

Continue reading
0 Comments

Tip of the Week: New Password Recommendations by NIST

Tip of the Week: New Password Recommendations by NIST

Passwords are always a major pain point for businesses, but in some industries, their importance is emphasized more than others. In particular, government-based organizations need to be prepared to keep more secure passwords. While we understand that not all organizations are government-based, there’s something to be said about proper password practices that we can all learn something from.

Continue reading
0 Comments

Powerful Physical Security Options

Powerful Physical Security Options

Data security isn’t the easiest thing in the world to plan for, especially if your organization doesn’t have any dedicated security professionals on-hand. While protecting your data with traditional methods, like passwords, firewalls, and antivirus, is important, what measures are you taking to make sure a thief or hacker isn’t just walking into your office and making off with your technology?

Continue reading
0 Comments

Why Your Google Account’s Security is So Important

Why Your Google Account’s Security is So Important

These days, it seems that to have a computer is to have a Google account. If one isn’t used for professional purposes, it is used as a personalized solution - and no wonder. The convenience and accessibility of these accounts alone are compelling, even before one considers the versatility that this account brings with it. Unfortunately, these benefits can be quickly overshadowed by risk if a Google account’s security is overlooked, even if unintentionally.

Continue reading
0 Comments

How the Grinch Didn’t Send that Email!

How the Grinch Didn’t Send that Email!

An email’s important,
That much is clear fact -
But you need to stay safe
From an email attack.

Continue reading
0 Comments

Don’t Get Scammed with Gift Cards

Don’t Get Scammed with Gift Cards

It’s the holiday season, and shoppers are flocking to stores to find the perfect gift for anyone: the gift card. However, these handy little plastic rectangles may not be so perfect after all. This year, they’ve been a key component to a business email compromise scam that has been popular in the past few months.

Continue reading
0 Comments

Those Irritating Spam Calls May Not Last Much Longer

Those Irritating Spam Calls May Not Last Much Longer

While the phone is still a useful communication tool, it lately has been the cause of a large amount of stress from businesses and users alike. While caller ID was once also a useful tool to help stop spam calls, we now cannot trust the numbers it provides. Letting personal calls go to voicemail to check them is one thing, but a business shouldn’t do that. What can they do?

Continue reading
0 Comments

Setting Android’s Security Options

Setting Android’s Security Options

You might be shocked to find out that your mobile device holds a considerable amount of personally identifiable information on it. This has prompted many users to secure their phones at all times, but others simply ignore the threat and brush it aside. Since Google makes it so easy, there’s no excuse for Android users not to secure their devices. Here’s how you can do it.

Recent comment in this post
JamesLGreen
I learn many things from this post about the security options of android and it was great for me. If you want to buy research pape... Read More
Friday, 14 December 2018 05:37
Continue reading
1 Comment

Bing Offers Malware and Filth

Bing Offers Malware and Filth

With a meager market share that is one-third the size of Google’s, one would think that Bing would be trying to keep controversy away from a user’s search results. However, the Microsoft search engine has recently encountered a few notable PR disasters that may be enough to convince some not to use it - especially if it leads to a security breach.

Continue reading
0 Comments

The Internet of Things Continues to Expand

The Internet of Things Continues to Expand

The Internet of Things is now made up of over 15 billion devices. 15 billion. This number includes both consumer devices in a home environment as well as business devices that are typically used in an office setting. As such, you cannot risk ignoring this phenomenon, whether it’s from a security standpoint or one of practicality. We’ll discuss the many ways the IoT is shaping business practices in today’s modern office.

Continue reading
0 Comments

Is It Safe to Have Your Browser Remember Your Passwords?

Is It Safe to Have Your Browser Remember Your Passwords?

Let’s be honest - not all of us have the best memories. This makes the ability for many browsers to remember our passwords seem like a godsend. However, is this capability actually a good thing for your cybersecurity? The answer may not surprise you.

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

SecurityTip of the WeekTechnologyBest PracticesPrivacyInternetCloudMicrosoftBusiness ComputingHackersSoftwareEfficiencyGoogleBusiness ManagementInnovationProductivityHosted SolutionsBackupUser TipsWorkplace TipsManaged Service ProviderMalwareBusinessMobile DevicesNetwork SecurityHardwareProductivityIT ServiceswindowsComputerUpgradeEmailDataCommunicationSaving MoneyGadgetsSmartphonesIT SupportMiscellaneousVirtualizationAppsWindows 10SmartphoneSmall BusinessNetworkDisaster RecoveryBusiness ContinuityVoIPBrowserServerMobile Device ManagementMicrosoft OfficeMobile ComputingTech TermAndroidSocial MediaHealthInformation TechnologyQuick TipsPasswordsData BackupCybersecurityWindows 10HolidayData RecoveryMobile OfficeOffice 365Operating SystemGoing GreenSave MoneycommunicationsOfficeChromeAlertBest PracticeCollaborationCybercrimeOutsourced ITUsersApplicationInternet of ThingsEmployer-Employee RelationshipBYODspamAppSearchManaged IT ServicesIT SupportRansomwareMarketingData SecurityLaw EnforcementWirelessTabletWearable TechnologyPhishingRemote ComputingAppleVendor ManagementWiFiBring Your Own DeviceThe Internet of ThingsFacebookUser ErrorRisk ManagementCost ManagementRemote MonitoringAntivirusUnified Threat ManagementHackingMaintenanceSaving TimeMoneyAvoiding DowntimeHistoryRouterWireless TechnologyMobilityBDRAutomationiPhoneOffice TipsPasswordBandwidthComputersData ManagementCloud ComputingSocialTelephone SystemsCustomer Relationship ManagementIT SolutionsTech SupportBig DataArtificial IntelligenceEncryptionOneNoteGovernmentHard DrivesFirewallUpdateInformationManaged IT ServicesLithium-ion batterySocial NetworkingUnsupported SoftwareCurrent EventsShortcutWi-FiVPNHumorWebsiteNetworkingVulnerabilityNet NeutralityEducationGoogle DrivePrinterOutlookBudgetPhone SystemGmailUSBPowerPointAnalyticsTwo-factor AuthenticationProactive ITIT COnsultantTrendingIdentity TheftAuditWordExcelComputer RepairIntranetLaptopAugmented RealityWork/Life BalanceManaged ServiceMeetingsContent FilteringTravelTelephonyVirusMobile DeviceadministrationPoliticsSocial EngineeringTelevisionRetailDisasterPaperless OfficeEntertainmentApplicationsRecoveryManaged ITBatteryPersonal InformationBlockchainStreaming MediaStorageAccess ControlPrintingSave TimeOnline CurrencyData ProtectionComputer CareGoogle AssistantConferencinghackerIT ManagementYoutubeHosted SolutionBusiness IntelligenceDevicesCustomer ServiceLegalPoint of SalePrinter ServerTransportationBiometricsUninterrupted Power SupplyEnd of SupportSalesHard DrivePatch ManagementCommerceData LossVirtual RealityFlexibilityPrivate CloudProgrammingTwitterHIPAAFraudInternet ExlporerGoogle DocsDisplayHuman ResourcesScamBusiness TechnologyAmazonDDoSData StorageInstant MessagingEmailsOneDriveWireless ChargingSportsFax ServerFile SharingWindows 8Mobile SecurityData BreachBenefitsWannaCryComputer AccessoriesComputingProject ManagementeWasteCortanaTouchscreenHybrid CloudEvernoteSamsungValueSaaSHaaSAutomobileCleaningManaging StressNFLCompany CulturejunkCo-Managed ServicesIdentitiesSpecificationsMedical ITWindows 10sCamerasReputationMicrosoft WordSharePointUserAdminfilterTelephoneLanguageNokiaAdministratorVirtual Desktop5GSolid State DrivePresentationWorker CommuteKeyboardGift GivingSoftware as a ServiceDevice SecurityTeamworkSettingsBest AvailableCommunityWindows InkScienceKeyboard ShortcutsHyperlinkVideo GamesISPComputer ForensicsAccessGiftsEmployeesHard Disk DriveHiring/FiringIntrantetMicrobloggingWIndows Server 2008Google MapsPayrollWasting TimeProactiveManagementBloggingCredit CardsBuisnessVoice over Internet ProtocolTutorialSmart TechnologyVendorSpywareRunning CableSecurity CamerasAccessoryWebsitesWireless InternetRobotFAQSabotageNear Field CommunicationEmployee-Employer RelationshipAdvertisingWebinarImagesSyncCo-managed ITMachine LearningPeripheralScalabilityData TheftGamificationData storageChargerPCiOSIT consultingExperiencePDFEdgeMicrosoft ExcelDowntimeUpgradesHow ToApp storeMemorySmartwatchPrint ServerComputer FanReliable ComputingMusicScreen MirroringEmployer Employee RelationshipComplianceTestingText MessagingDebateCiminalDistributed Denial of ServiceHelp DeskAdobeBloatwareE-CommerceConsultantBooksFinancialTouchpadEbayServer MaintenanceCastInbound MarketingCameraFilesPayment CardsBlack MarketIdentityElectronic Medical RecordsBrandingInvestmentMonitorsMouseProjectsIT budgetLicensingData PrivacyChromecastLegislationEmployeeWebinarSafetyLifestyleVirtual AssistantOperating SysytemWorkersROINanotechnologyWIndows 7TabletsNetwork CongestionTrainingWindows 73D PrintingChromebookComparisonBreak/FixSurge ProtectorIT solutionsRegulationsAlexa for BusinessUpdatesBluetoothHBORoot Cause Analysis