Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Social Media Can Cause Security Concerns

Social Media Can Cause Security Concerns

Social media is a great tool that your business can use to communicate with clients and prospective customers, but in an age where you can expect your employees to have their own accounts, it can be devastating to overlook the security issues associated with it. Today, we’ll examine how you can protect your organization from its employees’ social media use.

Continue reading
0 Comments

Social Media Can Help and Hurt Any Business

Social Media Can Help and Hurt Any Business

In many ways, social media is the defining characteristic of the information age. It has transformed the way people communicate, market their products and services, and it has brought a litany of issues into the public consciousness. On the other side of the coin, social media currently costs many business billions of dollars a year in lost productivity. Let’s take a look at the pros and cons of social media, and how your business can put yourself in a net-positive position regarding the technology.

Continue reading
0 Comments

Tip of the Week: Annoyed By Fake Friend Requests on Facebook? Here’s an Easy Fix

Tip of the Week: Annoyed By Fake Friend Requests on Facebook? Here’s an Easy Fix

Have you ever gotten Facebook requests from strange people who you don’t know? While it might be tempting to give them the benefit of the doubt--after all, maybe they know a friend of yours--it’s best to keep strangers off of your page when you can. In order to give your page, the flexibility to accept friend requests from people you may know, and protect it from strangers, you can implement a “follow” feature, and limit who can send you friend requests.

Continue reading
0 Comments

Social Media: The Most Effective Tool for Phishing Scams

Social Media: The Most Effective Tool for Phishing Scams

One thing that both fishing and phishing have in common is the use of lures. With the right lure, the chance of successfully catching the target improves. When it comes to the digital lures seen in phishing scams, research shows that social media is the most effective.

Continue reading
0 Comments

Tip of the Week: 4 Ways to Get a Handle on Social Media in the Workplace

Tip of the Week: 4 Ways to Get a Handle on Social Media in the Workplace

Social media may be a great way to connect with other professionals and communicate with your friends, but it can be dangerous if you have poor posting habits. Before you share something, think twice about whether it contains any sensitive information that could be risky to yourself and your business.

Continue reading
0 Comments

For Cyber Security Month, Take Extra Care Not to Overshare

b2ap3_thumbnail_oversharing_400.jpgOctober is Cyber Security month. We want to bring attention to this very important issue affecting every person and organization connected to the Internet. When discussing cyber security, we often talk about computer viruses and malware, but these threats are only part of the cyber security equation. It’s just as important that you, your staff, and even your family, are mindful to not overshare information online that can compromise your organization’s security and personal identities.

Continue reading
0 Comments

Web Hosting

Simply put web hosting is basically renting a place to hold your website, either an existing one or very commonly a new one created with tools provided by the web hosting company.  Web hosting companies own large server farms and lease space on those servers to companies and individuals to host their websites.  Beyond just providing bandwidth and storage on the physical servers they provide a wide variety of services such as website builder tools, domain name services (DNS), content management systems (CMS), shopping carts, security certificates (SSL), and many others.  So what should you look for in a hosting company?  Most importantly you should look for company that can help you understand and utilize all of the different services they offer.

One of the primary services is a website builder tool.  The website builders are useful for people who have little to no knowledge of coding languages such as HTML5, JavaScript, and CSS.  If you are planning on using their website builder you may want to consider what is the ease of use and how much control do you have over the site.  These two things are usually inverse of each other.  The easier the tool is to use the less control you may have, tools that give you the most control tend to be more complicated.  What templates and themes do they offer?  I am sure you have noticed that a lot of websites these days are looking very similar to each other.  This is because so many people are using the same templates or templates that are very similar to each other. There are benefits on either side though, having a standardized look that people are familiar and comfortable with vs being different, original, and standing out from the crowd.

How much storage space are you going to get, how many different pages and/or sites are you allowed, and what is the bandwidth.  Bandwidth is basically the volume of people that can use your website at the same time and the amount of information you can send back and forth with them.  DNS, which stands for Domain Name Service, is another commonly offered service.  It is like the yellow pages of the internet.  In order to request a web page you have to know its address.  DNS is what converts those friendly website names, like mygreatsite.com to a numerical address.  Most hosting companies will provide you with a free address but it will be something like mygreatsite.theHostingProviderName.com.  But they will also help you register your own unique name.

The types of services offered is growing all the time adding to the importance of working with a provider that will help you through the process, not simply sign you up and leave you to figure it all out on your own.

If you are considering hosting a new website or maybe replacing an older outdated site please contact us.  We provide all of the services mentioned above and many more including Search Engine Optimization (SEO) and social media services.  At Excedeo we are proud to offer a comprehensive web consulting service.

Continue reading
0 Comments

Twitter Can Be a Valuable Business Asset

b2ap3_thumbnail_twittastic_400.jpgDespite the fact that 255 million people use Twitter, some businesses want nothing to do with it. They see it as little more than a waste of time. However, these anti-Twitter activists fail to realize that the social media outlet has an unmistakably large influence in the marketing industry. Unlike Facebook, Twitter gives you the opportunity to customize your audience to suit the precise needs of your business, and the best part of this is that it’s completely free.

Continue reading
0 Comments

Are You or Your Team a Security Threat to Your Business?

b2ap3_thumbnail_manage_your_risk_400.jpgData security should be a top priority for every business. Having good security means identifying risks. Surprisingly, some of the biggest data risks come from within. If employees aren't following your organization's data management policies, then they're your biggest threats.

Continue reading
0 Comments

Quit Avoiding Proven Technologies!

b2ap3_thumbnail_solutions_for_business_400.jpgIt's the nature of technology to take a while for the market to fully appreciate it. After it's released, there's an implementation phase where the benefits are weighed against the risks. This phase is usually a slow one, but if the technology is good, then its acceptance will be widespread and businesses will have to give excuses on why they're not using it.

Recent comment in this post
BOGNA Cook
Please tell me that this is that sort of websites that helps with the work on https://www.bigbangdissertation.com/? Because I have... Read More
Sunday, 08 July 2018 20:36
Continue reading
1 Comment

The Dangerous Consequences of Posting Pics, and 3 Steps You Can Take to Protect Yourself

b2ap3_thumbnail_protect_your_likeness_400.jpgToday, almost everybody has an Internet-connected camera in their pocket. A crazy amount of photos are posted online. In fact, Facebook alone claims to have over 250 billion photos, with 350 million user images posted every day. All of these pictures are fun, but how do you ensure that only the people you want to see your photos are seeing them?

Continue reading
0 Comments

4,238,983 Records Compromised So Far in 2014… and Counting

b2ap3_thumbnail_tally_it_400.jpg2014 has been a year of technological advancement, but with any kind of advances such as these, there will always be those who want to steal the work of others. According to the Identity Theft Resource Center and , as of March this year, there have been 204 instances of data breaches this year alone. These affected companies are perfect examples of why web protection is important. Excedeo can provide you with this protection and peace of mind. Here are a few of the more unbelievable breaches, most of which could have been easily avoided.

Continue reading
0 Comments

Are Connected Employees More Valuable?

b2ap3_thumbnail_connected_employees_value_400.jpgWhenever you hire a new employee, you essentially incorporate their social network into the networking reach of your business. With this reality in mind (along with the measurable influence of an employee's use of social media) you have to ask yourself, "Is a connected employee more valuable than a non-connected employee?"

Continue reading
0 Comments

Get Your Business Started with Facebook

b2ap3_thumbnail_facebook_for_business_400.jpgSocial media isn't just some fad used by teenagers and twenty-somethings. It's not only a place to share pictures of your favorite dish, your status about your spouse, or where you can get the best deal on the latest war video game. Social media is a virtual powerhouse in the business world as well, and as it continues to grow, you must find a way to harness its potential and utilize it to give your organization an advantage. Where should you begin on your journey to social media proficiency? The answer is easy: Facebook.

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

SecurityTip of the WeekTechnologyBest PracticesPrivacyCloudInternetMicrosoftSoftwareBusiness ComputingGoogleBusiness ManagementHackersEfficiencyProductivityHosted SolutionsUser TipsBackupInnovationManaged Service ProviderMalwareBusinessWorkplace TipsMobile DevicesIT ServicesHardwarewindowsComputerNetwork SecurityUpgradeCommunicationIT SupportMiscellaneousSaving MoneyEmailProductivityVirtualizationDataSmartphonesWindows 10GadgetsBusiness ContinuityAppsSmartphoneServerBrowserDisaster RecoveryVoIPSmall BusinessNetworkMobile Device ManagementMicrosoft OfficeInformation TechnologyMobile ComputingSocial MediaTech TermHealthAndroidQuick TipsPasswordsCybersecurityGoing GreenOperating SystemData BackupMobile OfficeHolidayOffice 365Save MoneyChromeWindows 10Outsourced ITCybercrimecommunicationsAppApplicationOfficeAlertBest PracticeCollaborationspamData RecoveryMarketingSearchInternet of ThingsRansomwareEmployer-Employee RelationshipData SecurityLaw EnforcementUsersManaged IT ServicesBYODThe Internet of ThingsTabletFacebookWearable TechnologyAppleVendor ManagementWiFiRemote ComputingBring Your Own DeviceRouteriPhonePhishingWireless TechnologyBDRRisk ManagementCost ManagementUser ErrorRemote MonitoringMaintenanceMobilitySaving TimeUnified Threat ManagementAntivirusAvoiding DowntimeHistoryIT SupportMoneyHackingBig DataData ManagementComputersEncryptionSocialHard DrivesTelephone SystemsOneNoteGovernmentBandwidthAutomationCustomer Relationship ManagementOffice TipsPasswordIT SolutionsCloud ComputingTech SupportVulnerabilityGmailUSBNetworkingPowerPointAnalyticsGoogle DriveProactive ITFirewallArtificial IntelligenceSocial NetworkingBudgetLithium-ion batteryCurrent EventsPhone SystemWirelessVPNInformationHumorTwo-factor AuthenticationWebsiteUpdateNet NeutralityUnsupported SoftwarePrinterWi-FiOutlookShortcutMobile DeviceMeetingsPoliticsTravelSocial EngineeringIT COnsultantStreaming MediaComputer RepairTrendingApplicationsAuditEntertainmentManaged ITIntranetVirusRecoveryPersonal InformationLaptopBlockchainAugmented RealityContent FilteringadministrationIdentity TheftManaged IT ServicesDisasterEducationTelevisionWork/Life BalanceRetailExcelFlexibilityTelephonyCustomer ServiceComputingBiometricsFraudGoogle DocsPrivate CloudVirtual RealityBusiness TechnologyData StorageScamHIPAAWireless ChargingInternet ExlporerHuman ResourcesAccess ControlDDoSMobile SecurityEmailsWannaCryData BreachInstant MessagingProject ManagementTouchscreenCortanaOnline CurrencyHybrid CloudEvernoteSportsBenefitsSamsungeWasteBatteryComputer AccessoriesUninterrupted Power SupplySalesHard DriveSaaSAutomobileValuePoint of SaleCleaningPrinter ServerHaaSSave TimeData ProtectionProgrammingManaging StressTwitterComputer CareWordConferencingStorageGoogle AssistantIT ManagementhackerDisplayWindows 8AmazonManaged ServicePaperless OfficeDevicesLegalHosted SolutionTransportationBusiness IntelligenceFax ServerCommercePatch ManagementEnd of SupportData LossAccessoryEbayWebsitesPayment CardsWireless InternetFAQRobotAdvertisingEmployee-Employer RelationshipLifestyleSyncBuisnessRunning CableScalabilityPeripheralData TheftEmployeeGamificationiOSChargerExperienceData storagePDFNear Field CommunicationEdgeUpgradesMicrosoft ExcelHow ToApp storeBreak/Fix3D PrintingMemoryComputer FanMusicText MessagingIT consultingTestingScreen MirroringCiminalSurge ProtectorEmployer Employee RelationshipAdobeConsultantFile SharingMedical ITFinancialNokiaBooksTouchpadReliable ComputingCameraGift GivingCastAdminDistributed Denial of ServiceBlack MarketComplianceIdentityYoutubeMonitorsElectronic Medical RecordsBloatwareProjectsIT budgetKeyboard ShortcutsMicrobloggingLicensingWebinarLegislationInbound MarketingData PrivacyVirtual AssistantCommunityNanotechnologyWorkersFilesSafetyOperating SysytemBrandingISPWindows 7PayrollTrainingTabletsIT solutionsComparisonIntrantetMouseChromebookAlexa for BusinessRoot Cause AnalysisUpdatesChromecastHBOWIndows 7Co-Managed ServicesBloggingIdentitiesSecurity CamerasWebinarTutorialCompany CultureNFLImagesWindows 10sSpecificationsNetwork CongestionPrintingRegulationsMicrosoft WordReputationBluetoothTelephoneLanguageMachine LearningSolid State DriveWorker CommuteAdministratorjunkCamerasSoftware as a ServiceCo-managed ITSettingsDevice SecurityKeyboardHelp DeskSharePointVideo GamesUserHyperlinkDowntimeDebateWindows InkHard Disk DriveGiftsAccessfilterComputer ForensicsPresentationHiring/FiringWIndows Server 2008Virtual DesktopTeamworkOneDriveBest AvailableWasting TimeProactiveE-CommercePrint ServerGoogle MapsManagementCredit CardsScienceVendorSpywareSmart Technology