Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hackers Beware: IBM Unleashes Supercomputer Watson to Tackle Cybercrime

Hackers Beware: IBM Unleashes Supercomputer Watson to Tackle Cybercrime

Sherlock Holmes is one of the most famous detectives in fiction, but without his dear Dr. Watson, he would have been stumped on occasion. There’s a good reason why IBM named its super-intelligent computer, Watson, after the famous character. True to its namesake, Watson is now being used to safeguard 40 organizations from cyber security threats.

Continue reading
0 Comments

Tip of the Week: Follow this Security Checklist to Prevent a Hack Attack

b2ap3_thumbnail_use_checklists_400.jpgNetwork security entails a ton of different procedures, and it can be easy to lose track of what you’ve already implemented, and what still needs to be done. Instead of worrying about keeping your business’s confidential data safe, know with certainty that it’s as secure as possible by following our security checklist.

Continue reading
0 Comments

Is Online Pornography a Problem for Your Business?

b2ap3_thumbnail_content_filtering_400.jpgThe topic of online pornography can be rather uncomfortable to discuss, but it’s an issue that business owners need to be aware of; especially considering that 70 percent of all online porn access happens during business hours! Whoa. This statistic has some naughty implications for what your employees may be doing on company time.

Continue reading
0 Comments

“Zero Trust” Network Security: Only Trust Data as Far as You Can Throw It!

b2ap3_thumbnail_zero_trust_400.jpgWhen it feels like everybody is out to get you, there's only one way to survive: Trust nobody. You may not have too many physical enemies ready to jump you, but there's an army of hackers wanting to breach your company's database. One of the securest ways to keep your company's information safe is to implement a "zero trust" network security model.

Continue reading
0 Comments

Unified Threat Management: Ultimate Protection for a New Era

b2ap3_thumbnail_data_and_network_security_400.jpgEverything changes in due time. Computers grow less secure, malware grows more sophisticated, and hackers' methods change. According to Processor magazine, 80 to 90 percent of attacks are targeted at devices rather than networks and servers. Just like the weakest link in a fence, all it takes is one weak point for a hacker to take down your entire network.

Continue reading
0 Comments

Increase Employee Productivity by 25% with Content Filtering

b2ap3_thumbnail_content_filtering_boosts_productivity_400.jpg"Heigh-ho, heigh-ho. It's off to work we go!" Do you know the secret to why Dwarves are so good at mining? It's because they don't have an Internet connection in the caves to distract them from digging and singing. If you're looking to turn your staff into a loyal Dwarf-like workforce, then you will want to take advantage of content filtering.

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

SecurityTip of the WeekTechnologyBest PracticesPrivacyCloudInternetMicrosoftSoftwareBusiness ComputingGoogleHackersBusiness ManagementEfficiencyProductivityHosted SolutionsUser TipsBackupManaged Service ProviderInnovationBusinessWorkplace TipsMalwareMobile DevicesIT ServicesHardwarewindowsComputerNetwork SecurityUpgradeSaving MoneyEmailCommunicationIT SupportMiscellaneousProductivityDataVirtualizationSmartphonesWindows 10GadgetsAppsSmartphoneBusiness ContinuityDisaster RecoveryVoIPServerBrowserSmall BusinessNetworkMobile Device ManagementMicrosoft OfficeMobile ComputingSocial MediaTech TermInformation TechnologyQuick TipsPasswordsHealthAndroidCybersecurityMobile OfficeHolidayGoing GreenOperating SystemData BackupOffice 365Save MoneyChromeWindows 10AppOfficeApplicationAlertBest PracticeCollaborationspamCybercrimeOutsourced ITcommunicationsSearchInternet of ThingsRansomwareEmployer-Employee RelationshipData SecurityLaw EnforcementUsersManaged IT ServicesBYODMarketingData RecoveryFacebookWearable TechnologyAppleVendor ManagementWiFiRemote ComputingBring Your Own DeviceThe Internet of ThingsTabletCost ManagementUser ErrorRemote MonitoringMaintenanceMobilitySaving TimeUnified Threat ManagementAntivirusAvoiding DowntimeHistoryMoneyIT SupportHackingRouteriPhoneWireless TechnologyPhishingBDRRisk ManagementGovernmentBandwidthAutomationCustomer Relationship ManagementOffice TipsPasswordIT SolutionsCloud ComputingTech SupportComputersBig DataData ManagementEncryptionSocialHard DrivesTelephone SystemsOneNoteProactive ITFirewallArtificial IntelligenceSocial NetworkingBudgetLithium-ion batteryCurrent EventsPhone SystemWirelessVPNTwo-factor AuthenticationInformationHumorWebsiteNet NeutralityUpdateUnsupported SoftwarePrinterWi-FiShortcutOutlookVulnerabilityGmailUSBNetworkingPowerPointAnalyticsGoogle DriveComputer RepairStreaming MediaTrendingApplicationsAuditManaged ITEntertainmentIntranetRecoveryVirusAugmented RealityPersonal InformationLaptopBlockchainContent FilteringadministrationIdentity TheftManaged IT ServicesDisasterTelevisionEducationRetailExcelWork/Life BalanceMobile DeviceMeetingsTravelPoliticsIT COnsultantSocial EngineeringHuman ResourcesAccess ControlMobile SecurityDDoSInstant MessagingEmailsWannaCryData BreachProject ManagementOnline CurrencyTouchscreenCortanaHybrid CloudEvernoteSportsSamsungBenefitseWasteBatteryComputer AccessoriesSalesHard DriveUninterrupted Power SupplyValueSaaSAutomobilePoint of SaleCleaningPrinter ServerHaaSSave TimeData ProtectionTwitterComputer CareWordProgrammingManaging StressGoogle AssistantConferencingStorageIT ManagementhackerDisplayAmazonWindows 8Managed ServicePaperless OfficeDevicesLegalTransportationHosted SolutionPatch ManagementEnd of SupportBusiness IntelligenceFax ServerCommerceFlexibilityCustomer ServiceComputingTelephonyBiometricsFraudGoogle DocsVirtual RealityPrivate CloudScamBusiness TechnologyData StorageHIPAAWireless ChargingInternet ExlporerSurge ProtectorEmployer Employee RelationshipAdobeText MessagingIT consultingTestingScreen MirroringCiminalMedical ITConsultantFile SharingTouchpadFinancialNokiaBooksReliable ComputingCameraGift GivingCastAdminComplianceIdentityYoutubeDistributed Denial of ServiceBlack MarketBloatwareMonitorsElectronic Medical RecordsLicensingProjectsIT budgetKeyboard ShortcutsMicrobloggingInbound MarketingData PrivacyWebinarLegislationOperating SysytemVirtual AssistantCommunityNanotechnologyWorkersFilesSafetyPayrollTrainingTabletsBrandingISPWindows 7ChromebookIT solutionsComparisonIntrantetMouseAlexa for BusinessRoot Cause AnalysisUpdatesChromecastHBOIdentitiesSecurity CamerasWebinarTutorialCompany CultureNFLImagesWIndows 7Co-Managed ServicesBloggingPrintingWindows 10sSpecificationsNetwork CongestionReputationRegulationsMicrosoft WordLanguageMachine LearningBluetoothTelephoneAdministratorjunkSolid State DriveWorker CommuteKeyboardCamerasSoftware as a ServiceCo-managed ITSettingsDevice SecurityDowntimeDebateWindows InkHelp DeskSharePointVideo GamesUserHyperlinkAccessfilterComputer ForensicsHard Disk DriveGiftsHiring/FiringWIndows Server 2008Virtual DesktopPresentationProactiveE-CommercePrint ServerGoogle MapsTeamworkOneDriveBest AvailableWasting TimeScienceManagementCredit CardsSmart TechnologyVendorSpywareEbayWebsitesPayment CardsData LossAccessoryRobotWireless InternetFAQSyncBuisnessAdvertisingEmployee-Employer RelationshipLifestyleData TheftEmployeeRunning CableScalabilityPeripheralData storageGamificationiOSChargerExperiencePDFNear Field CommunicationEdgeApp storeBreak/FixUpgradesMicrosoft ExcelHow To3D PrintingMemoryComputer FanMusic