Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hackers Beware: IBM Unleashes Supercomputer Watson to Tackle Cybercrime

Hackers Beware: IBM Unleashes Supercomputer Watson to Tackle Cybercrime

Sherlock Holmes is one of the most famous detectives in fiction, but without his dear Dr. Watson, he would have been stumped on occasion. There’s a good reason why IBM named its super-intelligent computer, Watson, after the famous character. True to its namesake, Watson is now being used to safeguard 40 organizations from cyber security threats.

Continue reading
0 Comments

Tip of the Week: Follow this Security Checklist to Prevent a Hack Attack

b2ap3_thumbnail_use_checklists_400.jpgNetwork security entails a ton of different procedures, and it can be easy to lose track of what you’ve already implemented, and what still needs to be done. Instead of worrying about keeping your business’s confidential data safe, know with certainty that it’s as secure as possible by following our security checklist.

Continue reading
0 Comments

Is Online Pornography a Problem for Your Business?

b2ap3_thumbnail_content_filtering_400.jpgThe topic of online pornography can be rather uncomfortable to discuss, but it’s an issue that business owners need to be aware of; especially considering that 70 percent of all online porn access happens during business hours! Whoa. This statistic has some naughty implications for what your employees may be doing on company time.

Continue reading
0 Comments

“Zero Trust” Network Security: Only Trust Data as Far as You Can Throw It!

b2ap3_thumbnail_zero_trust_400.jpgWhen it feels like everybody is out to get you, there's only one way to survive: Trust nobody. You may not have too many physical enemies ready to jump you, but there's an army of hackers wanting to breach your company's database. One of the securest ways to keep your company's information safe is to implement a "zero trust" network security model.

Continue reading
0 Comments

Unified Threat Management: Ultimate Protection for a New Era

b2ap3_thumbnail_data_and_network_security_400.jpgEverything changes in due time. Computers grow less secure, malware grows more sophisticated, and hackers' methods change. According to Processor magazine, 80 to 90 percent of attacks are targeted at devices rather than networks and servers. Just like the weakest link in a fence, all it takes is one weak point for a hacker to take down your entire network.

Continue reading
0 Comments

Increase Employee Productivity by 25% with Content Filtering

b2ap3_thumbnail_content_filtering_boosts_productivity_400.jpg"Heigh-ho, heigh-ho. It's off to work we go!" Do you know the secret to why Dwarves are so good at mining? It's because they don't have an Internet connection in the caves to distract them from digging and singing. If you're looking to turn your staff into a loyal Dwarf-like workforce, then you will want to take advantage of content filtering.

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

SecurityTip of the WeekTechnologyBest PracticesPrivacyInternetCloudMicrosoftBusiness ComputingHackersSoftwareGoogleEfficiencyBusiness ManagementInnovationProductivityHosted SolutionsBackupUser TipsWorkplace TipsManaged Service ProviderMalwareMobile DevicesBusinessNetwork SecurityProductivityIT ServicesHardwarewindowsUpgradeComputerEmailDataCommunicationGadgetsSmartphonesIT SupportMiscellaneousSaving MoneyVirtualizationWindows 10SmartphoneAppsDisaster RecoveryBusiness ContinuitySmall BusinessNetworkBrowserVoIPServerMicrosoft OfficeMobile Device ManagementHealthAndroidSocial MediaMobile ComputingInformation TechnologyTech TermQuick TipsPasswordsCybersecurityWindows 10Operating SystemData BackupMobile OfficeOffice 365Going GreenHolidayData RecoverycommunicationsOfficeChromeSave MoneyCybercrimeOutsourced ITUsersAppApplicationInternet of ThingsAlertBest PracticeEmployer-Employee RelationshipBYODCollaborationspamRansomwareData SecurityLaw EnforcementMarketingManaged IT ServicesSearchIT SupportWearable TechnologyPhishingThe Internet of ThingsAppleFacebookVendor ManagementWiFiBring Your Own DeviceWirelessRemote ComputingTabletHackingMaintenanceSaving TimeRouterWireless TechnologyBDRHistoryUser ErrorRemote MonitoringMobilityUnified Threat ManagementAntivirusAutomationAvoiding DowntimeiPhoneRisk ManagementCost ManagementMoneyTech SupportComputersBig DataData ManagementEncryptionSocialTelephone SystemsCustomer Relationship ManagementOneNoteGovernmentArtificial IntelligenceBandwidthHard DrivesOffice TipsPasswordIT SolutionsCloud ComputingWi-FiShortcutOutlookVulnerabilityGmailUSBNetworkingPowerPointAnalyticsGoogle DriveProactive ITFirewallBudgetLithium-ion batteryCurrent EventsPhone SystemVPNTwo-factor AuthenticationInformationHumorManaged IT ServicesWebsiteNet NeutralityUpdateUnsupported SoftwareEducationSocial NetworkingPrinterMobile DeviceMeetingsTravelTelephonyPoliticsVirusadministrationSocial EngineeringStreaming MediaDisasterTrendingApplicationsAuditManaged ITEntertainmentIntranetBatteryRecoveryAugmented RealityPersonal InformationLaptopBlockchainContent FilteringIdentity TheftWordIT COnsultantTelevisionComputer RepairWork/Life BalanceRetailExcelManaged ServicePaperless OfficeTransportationYoutubeHosted SolutionPatch ManagementEnd of SupportBusiness IntelligenceFax ServerCommerceFlexibilityCustomer ServiceComputingBiometricsFraudUninterrupted Power SupplySalesGoogle DocsHard DriveVirtual RealityPrivate CloudScamBusiness TechnologyData StorageHIPAAWireless ChargingInternet ExlporerHuman ResourcesAccess ControlMobile SecurityFile SharingDDoSInstant MessagingEmailsWannaCryData BreachProject ManagementOnline CurrencyTouchscreenCortanaHybrid CloudWindows 8EvernoteSportsSamsungBenefitseWasteComputer AccessoriesValueSaaSAutomobilePoint of SaleCleaningPrinter ServerPrintingHaaSSave TimeData ProtectionTwitterComputer CareProgrammingManaging StressGoogle AssistantConferencingStorageIT ManagementhackerDisplayAmazonDevicesLegalOneDriveScienceManagementServer MaintenanceCredit CardsSmart TechnologyVendorSpywareEbayWebsitesPayment CardsMicrobloggingData LossAccessoryRobotWireless InternetInvestmentFAQSyncBuisnessAdvertisingEmployee-Employer RelationshipData TheftEmployeeRunning CableScalabilityPeripheralData storageGamificationROIiOSChargerExperiencePDFNear Field CommunicationEdgeApp storeBreak/FixWebinarUpgradesMicrosoft ExcelImagesHow To3D PrintingMemoryComputer FanMusicSurge ProtectorEmployer Employee RelationshipAdobeText MessagingIT consultingTestingScreen MirroringCiminalMedical ITConsultantTouchpadFinancialBooksReliable ComputingCameraCastAdminComplianceIdentity5GDebateHelp DeskDistributed Denial of ServiceBlack MarketBloatwareMonitorsElectronic Medical RecordsLicensingProjectsIT budgetKeyboard ShortcutsInbound MarketingData PrivacyEmployeesWebinarLegislationOperating SysytemVirtual AssistantCommunityNanotechnologyWorkersFilesSafetyTrainingTabletsBrandingISPWindows 7PayrollChromebookVoice over Internet ProtocolIT solutionsComparisonIntrantetMouseAlexa for BusinessRoot Cause AnalysisUpdatesChromecastHBOSecurity CamerasTutorialCompany CultureNFLWIndows 7Co-Managed ServicesLifestyleBloggingIdentitiesSabotageWindows 10sSpecificationsNetwork CongestionReputationRegulationsMicrosoft WordLanguageMachine LearningBluetoothTelephonejunkPCSolid State DriveWorker CommuteAdministratorCamerasSoftware as a ServiceCo-managed ITSettingsDevice SecurityKeyboardDowntimeWindows InkSharePointVideo GamesUserHyperlinkfilterComputer ForensicsSmartwatchHard Disk DriveGiftsAccessHiring/FiringWIndows Server 2008Virtual DesktopPresentationNokiaProactiveE-CommercePrint ServerGoogle MapsTeamworkBest AvailableWasting TimeGift Giving