Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Could You Spot a Social Engineering Attack?

Could You Spot a Social Engineering Attack?

As invaluable as the security solutions that protect a network are, they can be effectively rendered useless if a cybercriminal is skilled in social engineering. Social engineering is the practice of using manipulation to access protected resources, as we will review later. If your business and its team are vulnerable to a social engineering attempt, you are missing a critical piece of your data security strategy.

Continue reading
0 Comments

Alert: Hackers Posing as IT Support and Hijacking Computers

b2ap3_thumbnail_technology_take_400.jpgOne minute you’re browsing trusted sites on the Internet, the next, your PC freezes up and displays the dreaded blue screen of death, along with a fake tech support message. This strain of malware is duping plenty of computer users into calling the provided phone number, which only makes the situation worse.

Continue reading
0 Comments

How a Phishing Scam Works and What You Can Do to Protect Yourself

b2ap3_thumbnail_social_engineering_magnet_400.jpgMost hacking attacks are the result of a flaw or vulnerability found within the code of a program or operating system, but we rarely take into account the ones that don’t. Hackers often take advantage of the human side of hacking as well, a process known as “social engineering.” This is usually the act of conning users into handing over personal information of their own free will, and it’s surprisingly effective.

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

SecurityTip of the WeekTechnologyBest PracticesPrivacyInternetCloudMicrosoftSoftwareBusiness ComputingBusiness ManagementGoogleEfficiencyHackersProductivityHosted SolutionsBackupManaged Service ProviderUser TipsInnovationMalwareBusinessWorkplace TipsMobile DevicesIT ServicesComputerHardwarewindowsUpgradeNetwork SecurityIT SupportSaving MoneyMiscellaneousEmailSmartphonesDataVirtualizationWindows 10Business ContinuityCommunicationAppsGadgetsSmartphoneDisaster RecoveryVoIPProductivityMicrosoft OfficeServerBrowserNetworkMobile Device ManagementTech TermInformation TechnologyMobile ComputingSmall BusinessQuick TipsAndroidSocial MediaPasswordsHealthHolidayGoing GreenOperating SystemData BackupCybersecurityMobile OfficeChromeCybercrimecommunicationsAppOfficeOffice 365ApplicationAlertBest PracticeCollaborationspamSave MoneyWindows 10BYODMarketingData RecoveryOutsourced ITRansomwareEmployer-Employee RelationshipLaw EnforcementManaged IT ServicesWiFiRemote ComputingThe Internet of ThingsTabletSearchInternet of ThingsWearable TechnologyData SecurityUsersAppleVendor ManagementMoneyIT SupportBring Your Own DeviceHackingiPhoneRouterWireless TechnologyPhishingBDRRisk ManagementCost ManagementFacebookUser ErrorRemote MonitoringMaintenanceMobilitySaving TimeAntivirusUnified Threat ManagementAvoiding DowntimeHistoryOffice TipsPasswordIT SolutionsTech SupportComputersBig DataData ManagementEncryptionSocialHard DrivesTelephone SystemsOneNoteGovernmentBandwidthCustomer Relationship ManagementNet NeutralityUpdateUnsupported SoftwarePrinterCloud ComputingWi-FiShortcutOutlookVulnerabilityGmailUSBNetworkingPowerPointAnalyticsGoogle DriveProactive ITFirewallSocial NetworkingArtificial IntelligenceBudgetLithium-ion batteryCurrent EventsPhone SystemAutomationWirelessVPNTwo-factor AuthenticationHumorWebsiteDisasterTelevisionEducationRetailExcelWork/Life BalanceMobile DeviceTravelPoliticsIT COnsultantSocial EngineeringComputer RepairStreaming MediaTrendingApplicationsAuditManaged ITIntranetRecoveryVirusLaptopBlockchainAugmented RealityContent FilteringadministrationIdentity TheftInformationManaged IT ServicesStorageGoogle AssistanthackerDisplayAmazonWindows 8Managed ServicePaperless OfficeDevicesLegalTransportationHosted SolutionPatch ManagementEnd of SupportBusiness IntelligenceFax ServerCommerceMeetingsFlexibilityCustomer ServiceComputingTelephonyBiometricsFraudGoogle DocsVirtual RealityPrivate CloudScamBusiness TechnologyData StorageHIPAAWireless ChargingInternet ExlporerAccess ControlHuman ResourcesMobile SecurityDDoSInstant MessagingEmailsWannaCryData BreachProject ManagementOnline CurrencyTouchscreenCortanaSportsEntertainmentEvernoteSamsungBenefitsComputer AccessorieseWasteBatterySalesHard DrivePersonal InformationUninterrupted Power SupplyValueSaaSAutomobileCleaningPoint of SalePrinter ServerHaaSSave TimeData ProtectionTwitterComputer CareWordProgrammingManaging StressAdministratorjunkSolid State DriveConferencingWorker CommuteKeyboardIT ManagementCamerasSoftware as a ServiceCo-managed ITSettingsDevice SecurityDebateWindows InkHelp DeskSharePointVideo GamesUserHyperlinkAccessfilterComputer ForensicsHard Disk DriveGiftsHiring/FiringWIndows Server 2008Virtual DesktopPresentationProactivePrint ServerGoogle MapsTeamworkOneDriveBest AvailableWasting TimeScienceManagementCredit CardsSmart TechnologyVendorSpywareEbayWebsitesData LossAccessoryRobotWireless InternetFAQSyncBuisnessAdvertisingEmployee-Employer RelationshipLifestyleData TheftRunning CableScalabilityPeripheralData storageGamificationiOSChargerExperiencePDFNear Field CommunicationEdgeApp storeUpgradesMicrosoft ExcelHow To3D PrintingMemoryComputer FanMusicScreen MirroringCiminalSurge ProtectorEmployer Employee RelationshipAdobeText MessagingIT consultingTestingConsultantFile SharingBooksTouchpadFinancialNokiaCastAdminReliable ComputingCameraGift GivingComplianceIdentityYoutubeDistributed Denial of ServiceBlack MarketElectronic Medical RecordsBloatwareHybrid CloudMonitorsIT budgetKeyboard ShortcutsMicrobloggingLicensingProjectsInbound MarketingData PrivacyWebinarLegislationFilesSafetyOperating SysytemVirtual AssistantCommunityNanotechnologyWorkersPayrollTrainingTabletsBrandingISPWindows 7IntrantetMouseChromebookIT solutionsComparisonChromecastHBOAlexa for BusinessRoot Cause AnalysisUpdatesBloggingIdentitiesSecurity CamerasWebinarTutorialCompany CultureNFLImagesWIndows 7Co-Managed ServicesNetwork CongestionPrintingWindows 10sSpecificationsReputationRegulationsMicrosoft WordLanguageMachine LearningBluetoothTelephone