Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Annoyed By Fake Friend Requests on Facebook? Here’s an Easy Fix

Tip of the Week: Annoyed By Fake Friend Requests on Facebook? Here’s an Easy Fix

Have you ever gotten Facebook requests from strange people who you don’t know? While it might be tempting to give them the benefit of the doubt--after all, maybe they know a friend of yours--it’s best to keep strangers off of your page when you can. In order to give your page, the flexibility to accept friend requests from people you may know, and protect it from strangers, you can implement a “follow” feature, and limit who can send you friend requests.

Continue reading
0 Comments

Social Media: The Most Effective Tool for Phishing Scams

Social Media: The Most Effective Tool for Phishing Scams

One thing that both fishing and phishing have in common is the use of lures. With the right lure, the chance of successfully catching the target improves. When it comes to the digital lures seen in phishing scams, research shows that social media is the most effective.

Continue reading
0 Comments

Tip of the Week: 4 Ways to Get a Handle on Social Media in the Workplace

Tip of the Week: 4 Ways to Get a Handle on Social Media in the Workplace

Social media may be a great way to connect with other professionals and communicate with your friends, but it can be dangerous if you have poor posting habits. Before you share something, think twice about whether it contains any sensitive information that could be risky to yourself and your business.

Continue reading
0 Comments

For Cyber Security Month, Take Extra Care Not to Overshare

b2ap3_thumbnail_oversharing_400.jpgOctober is Cyber Security month. We want to bring attention to this very important issue affecting every person and organization connected to the Internet. When discussing cyber security, we often talk about computer viruses and malware, but these threats are only part of the cyber security equation. It’s just as important that you, your staff, and even your family, are mindful to not overshare information online that can compromise your organization’s security and personal identities.

Continue reading
0 Comments

Web Hosting

Simply put web hosting is basically renting a place to hold your website, either an existing one or very commonly a new one created with tools provided by the web hosting company.  Web hosting companies own large server farms and lease space on those servers to companies and individuals to host their websites.  Beyond just providing bandwidth and storage on the physical servers they provide a wide variety of services such as website builder tools, domain name services (DNS), content management systems (CMS), shopping carts, security certificates (SSL), and many others.  So what should you look for in a hosting company?  Most importantly you should look for company that can help you understand and utilize all of the different services they offer.

One of the primary services is a website builder tool.  The website builders are useful for people who have little to no knowledge of coding languages such as HTML5, JavaScript, and CSS.  If you are planning on using their website builder you may want to consider what is the ease of use and how much control do you have over the site.  These two things are usually inverse of each other.  The easier the tool is to use the less control you may have, tools that give you the most control tend to be more complicated.  What templates and themes do they offer?  I am sure you have noticed that a lot of websites these days are looking very similar to each other.  This is because so many people are using the same templates or templates that are very similar to each other. There are benefits on either side though, having a standardized look that people are familiar and comfortable with vs being different, original, and standing out from the crowd.

How much storage space are you going to get, how many different pages and/or sites are you allowed, and what is the bandwidth.  Bandwidth is basically the volume of people that can use your website at the same time and the amount of information you can send back and forth with them.  DNS, which stands for Domain Name Service, is another commonly offered service.  It is like the yellow pages of the internet.  In order to request a web page you have to know its address.  DNS is what converts those friendly website names, like mygreatsite.com to a numerical address.  Most hosting companies will provide you with a free address but it will be something like mygreatsite.theHostingProviderName.com.  But they will also help you register your own unique name.

The types of services offered is growing all the time adding to the importance of working with a provider that will help you through the process, not simply sign you up and leave you to figure it all out on your own.

If you are considering hosting a new website or maybe replacing an older outdated site please contact us.  We provide all of the services mentioned above and many more including Search Engine Optimization (SEO) and social media services.  At Excedeo we are proud to offer a comprehensive web consulting service.

Continue reading
0 Comments

Twitter Can Be a Valuable Business Asset

b2ap3_thumbnail_twittastic_400.jpgDespite the fact that 255 million people use Twitter, some businesses want nothing to do with it. They see it as little more than a waste of time. However, these anti-Twitter activists fail to realize that the social media outlet has an unmistakably large influence in the marketing industry. Unlike Facebook, Twitter gives you the opportunity to customize your audience to suit the precise needs of your business, and the best part of this is that it’s completely free.

Continue reading
0 Comments

Are You or Your Team a Security Threat to Your Business?

b2ap3_thumbnail_manage_your_risk_400.jpgData security should be a top priority for every business. Having good security means identifying risks. Surprisingly, some of the biggest data risks come from within. If employees aren't following your organization's data management policies, then they're your biggest threats.

Continue reading
0 Comments

Quit Avoiding Proven Technologies!

b2ap3_thumbnail_solutions_for_business_400.jpgIt's the nature of technology to take a while for the market to fully appreciate it. After it's released, there's an implementation phase where the benefits are weighed against the risks. This phase is usually a slow one, but if the technology is good, then its acceptance will be widespread and businesses will have to give excuses on why they're not using it.

Recent comment in this post
BOGNA Cook
Please tell me that this is that sort of websites that helps with the work on https://www.bigbangdissertation.com/? Because I have... Read More
Sunday, 08 July 2018 20:36
Continue reading
1 Comment

The Dangerous Consequences of Posting Pics, and 3 Steps You Can Take to Protect Yourself

b2ap3_thumbnail_protect_your_likeness_400.jpgToday, almost everybody has an Internet-connected camera in their pocket. A crazy amount of photos are posted online. In fact, Facebook alone claims to have over 250 billion photos, with 350 million user images posted every day. All of these pictures are fun, but how do you ensure that only the people you want to see your photos are seeing them?

Continue reading
0 Comments

4,238,983 Records Compromised So Far in 2014… and Counting

b2ap3_thumbnail_tally_it_400.jpg2014 has been a year of technological advancement, but with any kind of advances such as these, there will always be those who want to steal the work of others. According to the Identity Theft Resource Center and , as of March this year, there have been 204 instances of data breaches this year alone. These affected companies are perfect examples of why web protection is important. Excedeo can provide you with this protection and peace of mind. Here are a few of the more unbelievable breaches, most of which could have been easily avoided.

Continue reading
0 Comments

Are Connected Employees More Valuable?

b2ap3_thumbnail_connected_employees_value_400.jpgWhenever you hire a new employee, you essentially incorporate their social network into the networking reach of your business. With this reality in mind (along with the measurable influence of an employee's use of social media) you have to ask yourself, "Is a connected employee more valuable than a non-connected employee?"

Continue reading
0 Comments

Get Your Business Started with Facebook

b2ap3_thumbnail_facebook_for_business_400.jpgSocial media isn't just some fad used by teenagers and twenty-somethings. It's not only a place to share pictures of your favorite dish, your status about your spouse, or where you can get the best deal on the latest war video game. Social media is a virtual powerhouse in the business world as well, and as it continues to grow, you must find a way to harness its potential and utilize it to give your organization an advantage. Where should you begin on your journey to social media proficiency? The answer is easy: Facebook.

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

SecurityTip of the WeekTechnologyBest PracticesPrivacyInternetCloudMicrosoftSoftwareBusiness ComputingBusiness ManagementHackersGoogleEfficiencyProductivityHosted SolutionsBackupManaged Service ProviderUser TipsWorkplace TipsMalwareBusinessInnovationMobile DeviceswindowsIT ServicesComputerHardwareUpgradeNetwork SecurityIT SupportSaving MoneyEmailMiscellaneousDataVirtualizationSmartphonesWindows 10Business ContinuityGadgetsCommunicationSmartphoneAppsDisaster RecoveryProductivityVoIPNetworkBrowserMicrosoft OfficeMobile Device ManagementServerSmall BusinessMobile ComputingInformation TechnologyTech TermAndroidQuick TipsPasswordsHealthSocial MediaOperating SystemData BackupMobile OfficeCybersecurityGoing GreenHolidayChromeCybercrimecommunicationsAppApplicationOfficeOffice 365AlertBest PracticeCollaborationspamSave MoneyWindows 10Data RecoveryOutsourced ITRansomwareEmployer-Employee RelationshipData SecurityBYODLaw EnforcementMarketingManaged IT ServicesWearable TechnologyThe Internet of ThingsAppleUsersVendor ManagementInternet of ThingsWiFiRemote ComputingTabletSearchHackingMaintenanceSaving TimeRouterWireless TechnologyPhishingBDRHistoryFacebookUser ErrorRemote MonitoringBring Your Own DeviceMobilityAntivirusUnified Threat ManagementAvoiding DowntimeiPhoneRisk ManagementCost ManagementMoneyIT SupportTech SupportComputersBig DataData ManagementEncryptionSocialTelephone SystemsCustomer Relationship ManagementOneNoteGovernmentBandwidthHard DrivesOffice TipsPasswordIT SolutionsWi-FiShortcutOutlookVulnerabilityGmailUSBNetworkingPowerPointAnalyticsGoogle DriveProactive ITFirewallArtificial IntelligenceLithium-ion batteryBudgetCurrent EventsPhone SystemAutomationWirelessVPNTwo-factor AuthenticationHumorWebsiteNet NeutralityUpdateUnsupported SoftwarePrinterSocial NetworkingCloud ComputingMobile DeviceTravelPoliticsVirusadministrationSocial EngineeringStreaming MediaApplicationsDisasterTrendingAuditManaged ITBlockchainIntranetRecoveryLaptopAugmented RealityPersonal InformationContent FilteringInformationIdentity TheftManaged IT ServicesIT COnsultantTelevisionEducationExcelRetailComputer RepairWork/Life BalanceTransportationHosted SolutionEnd of SupportBusiness IntelligenceFax ServerCommerceFraudMeetingsFlexibilityCustomer ServiceComputingGoogle DocsTelephonyBiometricsUninterrupted Power SupplySalesHard DriveBusiness TechnologyPrivate CloudVirtual RealityData StorageScamWireless ChargingAccess ControlHIPAAInternet ExlporerMobile SecurityHuman ResourcesData BreachProject ManagementDDoSInstant MessagingEmailsCortanaWannaCryEvernoteOnline CurrencyTouchscreenSportsEntertainmentWindows 8SamsungBenefitsComputer AccessorieseWasteBatteryValueSaaSAutomobileCleaningPoint of SaleData ProtectionPrinter ServerWordHaaSSave TimeGoogle AssistantTwitterComputer CareProgrammingManaging StressStoragehackerDevicesDisplayManaged ServiceAmazonPaperless OfficePatch ManagementLegalAccessoryScienceWebsitesData LossYoutubeSmart TechnologyWireless InternetFAQEbaySyncMicrobloggingEmployee-Employer RelationshipPeripheralRobotData TheftBuisnessAdvertisingGamificationChargerEdgeRunning CableScalabilityExperienceData storageApp storeMicrosoft ExceliOSPDFMemoryNear Field CommunicationCiminalAdobeWebinarUpgradesImagesHow ToTestingMusic3D PrintingFile SharingComputer FanScreen MirroringSurge ProtectorEmployer Employee RelationshipText MessagingFinancialIT consultingCameraAdminConsultantBooksTouchpadIdentityCastHybrid CloudReliable ComputingProjectsIT budgetKeyboard ShortcutsComplianceLicensingDebateHelp DeskDistributed Denial of ServiceBlack MarketElectronic Medical RecordsBloatwareData PrivacyLegislationMonitorsWorkersVirtual AssistantWindows 7PayrollInbound MarketingTabletsWebinarFilesSafetyOperating SysytemChromebookComparisonCommunityNanotechnologyUpdatesHBOTrainingBrandingAlexa for BusinessISPCo-Managed ServicesMouseIntrantetIdentitiesSecurity CamerasNFLIT solutionsChromecastPrintingSpecificationsRoot Cause AnalysisMicrosoft WordLifestyleBloggingTutorialCompany CultureWIndows 7TelephoneNetwork CongestionLanguageMachine LearningWindows 10sReputationRegulationsConferencingDevice SecurityIT ManagementBluetoothSoftware as a ServiceHyperlinkAdministratorjunkWindows InkSolid State DriveWorker CommuteKeyboardComputer ForensicsCamerasGiftsCo-managed ITSettingsWIndows Server 2008SharePointVideo GamesUserWasting TimeAccessProactivefilterGoogle MapsHard Disk DriveHiring/FiringVirtual DesktopManagementPresentationCredit CardsNokiaSpywareGift GivingPrint ServerTeamworkVendorOneDriveBest Available