Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hackers Beware: IBM Unleashes Supercomputer Watson to Tackle Cybercrime

Hackers Beware: IBM Unleashes Supercomputer Watson to Tackle Cybercrime

Sherlock Holmes is one of the most famous detectives in fiction, but without his dear Dr. Watson, he would have been stumped on occasion. There’s a good reason why IBM named its super-intelligent computer, Watson, after the famous character. True to its namesake, Watson is now being used to safeguard 40 organizations from cyber security threats.

Continue reading
0 Comments

Tip of the Week: Follow this Security Checklist to Prevent a Hack Attack

b2ap3_thumbnail_use_checklists_400.jpgNetwork security entails a ton of different procedures, and it can be easy to lose track of what you’ve already implemented, and what still needs to be done. Instead of worrying about keeping your business’s confidential data safe, know with certainty that it’s as secure as possible by following our security checklist.

Continue reading
0 Comments

Is Online Pornography a Problem for Your Business?

b2ap3_thumbnail_content_filtering_400.jpgThe topic of online pornography can be rather uncomfortable to discuss, but it’s an issue that business owners need to be aware of; especially considering that 70 percent of all online porn access happens during business hours! Whoa. This statistic has some naughty implications for what your employees may be doing on company time.

Continue reading
0 Comments

“Zero Trust” Network Security: Only Trust Data as Far as You Can Throw It!

b2ap3_thumbnail_zero_trust_400.jpgWhen it feels like everybody is out to get you, there's only one way to survive: Trust nobody. You may not have too many physical enemies ready to jump you, but there's an army of hackers wanting to breach your company's database. One of the securest ways to keep your company's information safe is to implement a "zero trust" network security model.

Continue reading
0 Comments

Unified Threat Management: Ultimate Protection for a New Era

b2ap3_thumbnail_data_and_network_security_400.jpgEverything changes in due time. Computers grow less secure, malware grows more sophisticated, and hackers' methods change. According to Processor magazine, 80 to 90 percent of attacks are targeted at devices rather than networks and servers. Just like the weakest link in a fence, all it takes is one weak point for a hacker to take down your entire network.

Continue reading
0 Comments

Increase Employee Productivity by 25% with Content Filtering

b2ap3_thumbnail_content_filtering_boosts_productivity_400.jpg"Heigh-ho, heigh-ho. It's off to work we go!" Do you know the secret to why Dwarves are so good at mining? It's because they don't have an Internet connection in the caves to distract them from digging and singing. If you're looking to turn your staff into a loyal Dwarf-like workforce, then you will want to take advantage of content filtering.

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

SecurityTip of the WeekTechnologyBest PracticesPrivacyInternetCloudMicrosoftSoftwareBusiness ComputingBusiness ManagementGoogleEfficiencyHackersProductivityHosted SolutionsBackupManaged Service ProviderUser TipsWorkplace TipsInnovationMalwareBusinessMobile DeviceswindowsIT ServicesComputerHardwareUpgradeNetwork SecurityIT SupportSaving MoneyEmailMiscellaneousDataVirtualizationWindows 10SmartphonesSmartphoneGadgetsBusiness ContinuityCommunicationAppsDisaster RecoveryVoIPProductivityNetworkMobile Device ManagementMicrosoft OfficeServerBrowserMobile ComputingSmall BusinessTech TermInformation TechnologyQuick TipsPasswordsAndroidSocial MediaHealthMobile OfficeHolidayGoing GreenOperating SystemData BackupCybersecurityChromeCollaborationspamSave MoneyCybercrimecommunicationsAppOfficeOffice 365ApplicationAlertBest PracticeData SecurityLaw EnforcementManaged IT ServicesWindows 10BYODMarketingData RecoveryOutsourced ITRansomwareEmployer-Employee RelationshipAppleUsersVendor ManagementWiFiRemote ComputingThe Internet of ThingsTabletSearchInternet of ThingsWearable TechnologyMobilitySaving TimeUnified Threat ManagementAntivirusAvoiding DowntimeHistoryMoneyIT SupportBring Your Own DeviceHackingRouteriPhoneWireless TechnologyPhishingBDRRisk ManagementCost ManagementFacebookUser ErrorRemote MonitoringMaintenanceBandwidthCustomer Relationship ManagementOffice TipsPasswordIT SolutionsTech SupportBig DataData ManagementComputersEncryptionSocialHard DrivesTelephone SystemsOneNoteGovernmentBudgetLithium-ion batteryCurrent EventsPhone SystemAutomationWirelessVPNTwo-factor AuthenticationHumorWebsiteNet NeutralityUpdateUnsupported SoftwareCloud ComputingPrinterWi-FiShortcutOutlookVulnerabilityGmailUSBNetworkingPowerPointAnalyticsGoogle DriveProactive ITFirewallArtificial IntelligenceSocial NetworkingIntranetRecoveryVirusAugmented RealityPersonal InformationLaptopBlockchainContent FilteringadministrationIdentity TheftInformationManaged IT ServicesDisasterTelevisionEducationWork/Life BalanceRetailExcelMobile DeviceTravelPoliticsIT COnsultantSocial EngineeringComputer RepairStreaming MediaTrendingApplicationsAuditManaged ITSamsungBenefitseWasteBatteryComputer AccessoriesHard DriveUninterrupted Power SupplySalesValueSaaSAutomobilePoint of SaleCleaningPrinter ServerHaaSSave TimeData ProtectionTwitterComputer CareWordProgrammingManaging StressGoogle AssistantStoragehackerDisplayAmazonWindows 8Managed ServicePaperless OfficeDevicesLegalHosted SolutionTransportationPatch ManagementEnd of SupportBusiness IntelligenceFax ServerCommerceMeetingsFlexibilityComputingTelephonyCustomer ServiceBiometricsFraudGoogle DocsPrivate CloudVirtual RealityScamBusiness TechnologyData StorageHIPAAWireless ChargingInternet ExlporerHuman ResourcesAccess ControlMobile SecurityDDoSInstant MessagingEmailsWannaCryData BreachProject ManagementOnline CurrencyTouchscreenCortanaEntertainmentEvernoteSportsLicensingProjectsIT budgetKeyboard ShortcutsMicrobloggingInbound MarketingData PrivacyWebinarLegislationOperating SysytemVirtual AssistantCommunityNanotechnologyWorkersFilesSafetyTrainingTabletsBrandingISPWindows 7PayrollChromebookIT solutionsComparisonIntrantetMouseAlexa for BusinessRoot Cause AnalysisUpdatesChromecastHBOTutorialCompany CultureNFLImagesWIndows 7Co-Managed ServicesBloggingIdentitiesSecurity CamerasWebinarPrintingWindows 10sSpecificationsNetwork CongestionReputationRegulationsMicrosoft WordBluetoothTelephoneLanguageMachine LearningjunkSolid State DriveConferencingWorker CommuteAdministratorCamerasSoftware as a ServiceCo-managed ITSettingsDevice SecurityKeyboardIT ManagementDebateWindows InkHelp DeskSharePointVideo GamesUserHyperlinkfilterComputer ForensicsHard Disk DriveGiftsAccessVirtual DesktopPresentationHiring/FiringWIndows Server 2008ProactivePrint ServerGoogle MapsTeamworkOneDriveBest AvailableWasting TimeManagementCredit CardsScienceVendorSpywareSmart TechnologyWebsitesData LossAccessoryEbayWireless InternetFAQRobotSyncBuisnessAdvertisingEmployee-Employer RelationshipLifestyleData TheftRunning CableScalabilityPeripheralData storageGamificationiOSChargerExperiencePDFNear Field CommunicationEdgeApp storeUpgradesMicrosoft ExcelHow To3D PrintingMemoryComputer FanMusicEmployer Employee RelationshipAdobeText MessagingIT consultingTestingScreen MirroringCiminalSurge ProtectorConsultantFile SharingTouchpadFinancialNokiaBooksReliable ComputingCameraGift GivingCastAdminComplianceIdentityYoutubeDistributed Denial of ServiceBlack MarketBloatwareHybrid CloudMonitorsElectronic Medical Records