Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Keep Your End Users From Contributing to Security Issues

Keep Your End Users From Contributing to Security Issues

Insider threats contribute to a significant number of data breaches. These cases of data exposure are enabled by a member of your staff, whether they intended to harm your business or simply made an honest mistake. With so much focus directed toward the threats out in the world, sometimes we forget that the biggest dangers can be among our ranks. To make up for this, we’ll discuss a few ways to keep insider threats from doing your business too much harm.

Continue reading
0 Comments

Your Employees Can Be One Of Your Biggest Security Risks

Your Employees Can Be One Of Your Biggest Security Risks

A surprising number of security issues come from inside your organization. User error on the part of the employee can present major problems for your workflow, data security, and the integrity of your business. User error could be something as simple as an employee clicking on the wrong links when they receive a suspicious email in their inbox, or if they are accessing data that they simply have no business accessing in the first place. Sometimes businesses will even completely forget to remove employee credentials when they leave a project or the company creating a breachable hole in your network. Regardless of the reason, user error can be a detrimental occurrence, and one which must be prepared for.

Continue reading
0 Comments

Tip of the Week: Even the Most Careful People Fall For These 4 Email Mistakes

b2ap3_thumbnail_email_gaffes_400.jpgDespite the rapid advancements of business technology in the past decade, enterprises the world over are still heavily dependent upon email. Therefore, every modern worker needs to be trained on how to send a professional email. If not, classic email mistakes will be made that could bruise your company’s reputation, like these four common email blunders.

Recent comment in this post
Macey Moss
Sometimes many careful people fall in email mistakes and this may cause to lose their important data like office files. If you wan... Read More
Thursday, 13 December 2018 06:57
Continue reading
1 Comment

3 Reasons Why Humans Screw Up Technology

b2ap3_thumbnail_human_tech_issues_400.jpgTechnology is reliable. With correct coding and high-level instructions, technology will do exactly what it’s supposed to do. Yet, technology has a reputation for failing and being hard to work with. Might we be so bold as to suggest that the majority of technology problems are actually caused by humans? Here are three ways that human behavior breaks perfectly good technology.

Recent comment in this post
Carly Castaneda
People think that the technology is very difficult to use but this is very easy to use when we use it daily. 3 reason why human sc... Read More
Wednesday, 08 August 2018 05:55
Continue reading
1 Comment

Are You or Your Team a Security Threat to Your Business?

b2ap3_thumbnail_manage_your_risk_400.jpgData security should be a top priority for every business. Having good security means identifying risks. Surprisingly, some of the biggest data risks come from within. If employees aren't following your organization's data management policies, then they're your biggest threats.

Continue reading
0 Comments

Grab the Air Freshener for These 2 Stinky IT Brain Fart Stories!

b2ap3_thumbnail_it_mistakes_400.jpgWe all experience temporary mental lapses (also known as "brain farts"). The worst kind of brain flatulence is when the consequences stink up the workplace, causing downtime and loss of revenue. One of the worst places to let a brain fart rip is in the IT department.

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

SecurityTip of the WeekTechnologyBest PracticesPrivacyInternetCloudMicrosoftBusiness ComputingHackersSoftwareGoogleEfficiencyBusiness ManagementInnovationProductivityHosted SolutionsBackupWorkplace TipsUser TipsManaged Service ProviderMalwareMobile DevicesBusinessNetwork SecurityHardwareIT ServiceswindowsComputerUpgradeProductivityEmailDataCommunicationGadgetsSmartphonesIT SupportMiscellaneousSaving MoneyVirtualizationAppsWindows 10SmartphoneSmall BusinessNetworkDisaster RecoveryBusiness ContinuityBrowserVoIPServerMobile Device ManagementMicrosoft OfficeAndroidTech TermSocial MediaHealthInformation TechnologyMobile ComputingQuick TipsPasswordsCybersecurityOffice 365HolidayMobile OfficeOperating SystemGoing GreenData BackupWindows 10communicationsSave MoneyOfficeChromeData RecoveryApplicationInternet of ThingsEmployer-Employee RelationshipUsersspamAppBYODAlertBest PracticeCybercrimeOutsourced ITCollaborationData SecurityRansomwareLaw EnforcementManaged IT ServicesIT SupportMarketingSearchWearable TechnologyRemote ComputingAppleVendor ManagementWiFiWirelessThe Internet of ThingsBring Your Own DeviceFacebookTabletPhishingMaintenanceSaving TimeMobilityHistoryAutomationRouterWireless TechnologyBDRMoneyUser ErrorHackingiPhoneRemote MonitoringAntivirusUnified Threat ManagementRisk ManagementCost ManagementAvoiding DowntimeTelephone SystemsArtificial IntelligenceIT SolutionsTech SupportCustomer Relationship ManagementBig DataEncryptionOffice TipsOneNoteGovernmentPasswordCloud ComputingComputersBandwidthData ManagementHard DrivesSocialGoogle DriveVPNSocial NetworkingHumorWebsiteNet NeutralityEducationBudgetInformationPrinterPhone SystemOutlookGmailUSBTwo-factor AuthenticationManaged IT ServicesPowerPointUpdateAnalyticsUnsupported SoftwareProactive ITFirewallWi-FiShortcutLithium-ion batteryVulnerabilityCurrent EventsNetworkingSocial EngineeringBlockchainTelevisionVirusRetailManaged ITEntertainmentPaperless OfficeadministrationWordBatteryRecoveryPersonal InformationDisasterManaged ServiceIdentity TheftWork/Life BalanceStreaming MediaExcelTrendingAuditMobile DeviceMeetingsIntranetTravelTelephonyPoliticsIT COnsultantLaptopAugmented RealityApplicationsContent FilteringComputer RepairHIPAAPrinter ServerInternet ExlporerYoutubeHuman ResourcesTwitterDDoSProgrammingInstant MessagingEmailsWannaCryDisplayTouchscreenHard DriveAmazonPrintingUninterrupted Power SupplySalesSportsSamsungData ProtectionBenefitseWasteOneDriveComputer AccessoriesGoogle AssistantConferencingIT ManagementFax ServerValueSaaSAutomobileComputingCleaningDevicesHaaSSave TimeWindows 8Computer CarePatch ManagementManaging StressStoragehackerFraudGoogle DocsLegalBusiness TechnologyTransportationOnline CurrencyHosted SolutionEnd of SupportBusiness IntelligenceCommerceWireless ChargingAccess ControlFlexibilityCustomer ServiceMobile SecurityFile SharingBiometricsData BreachProject ManagementVirtual RealityCortanaPrivate CloudScamPoint of SaleHybrid CloudData StorageEvernoteProjectsBloggingIT budgetNokiaKeyboard ShortcutsTutorialUpgradesLicensingHow ToData PrivacyGift GivingEmployeesComputer FanLegislationMusicWorkersEmployer Employee RelationshipText MessagingIT consultingVirtual AssistantScreen MirroringWindows 7PayrollConsultantTabletsTouchpadChromebookVoice over Internet ProtocolComparisonMicrobloggingBooksUpdatesHBOReliable ComputingAlexa for BusinessCo-managed ITCastCo-Managed ServicesComplianceIdentitiesSecurity CamerasNFLDistributed Denial of ServiceBlack MarketBloatwareSabotageMonitorsSpecificationsElectronic Medical RecordsMicrosoft WordTelephoneInbound MarketingLanguageMachine LearningPrint ServerWebinarImagesOperating SysytemPCNanotechnologyWebinarFilesSafetyDevice SecurityTrainingBrandingSoftware as a ServiceHyperlinkEbayDowntimeIT solutionsWindows InkMouseComputer ForensicsSmartwatchRoot Cause AnalysisGiftsChromecastCompany CultureWIndows Server 2008WIndows 7Wasting TimeProactiveE-CommerceWindows 10sGoogle MapsNetwork CongestionHelp DeskReputationRegulationsManagementServer MaintenanceCredit CardsDebateSpywareBluetoothVendorAccessoryjunkWebsitesPayment CardsSolid State DriveData LossWorker CommuteAdministratorKeyboard3D PrintingCamerasWireless InternetInvestmentSettingsFAQSurge ProtectorSyncSharePointVideo GamesUserEmployee-Employer RelationshipAccessPeripheralfilterData TheftEmployeeHard Disk DriveHiring/FiringVirtual DesktopPresentationGamificationROIChargerEdgeTeamworkBest AvailableScienceApp storeLifestyleBreak/FixMicrosoft ExcelSmart TechnologyMemoryCiminalAdobeTestingRobotMedical ITBuisnessAdvertisingFinancialCommunityAdminRunning CableScalabilityISPCameraIntrantetData storageIdentity5GiOSExperiencePDFNear Field Communication