Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Keep Your End Users From Contributing to Security Issues

Keep Your End Users From Contributing to Security Issues

Insider threats contribute to a significant number of data breaches. These cases of data exposure are enabled by a member of your staff, whether they intended to harm your business or simply made an honest mistake. With so much focus directed toward the threats out in the world, sometimes we forget that the biggest dangers can be among our ranks. To make up for this, we’ll discuss a few ways to keep insider threats from doing your business too much harm.

Continue reading
0 Comments

Your Employees Can Be One Of Your Biggest Security Risks

Your Employees Can Be One Of Your Biggest Security Risks

A surprising number of security issues come from inside your organization. User error on the part of the employee can present major problems for your workflow, data security, and the integrity of your business. User error could be something as simple as an employee clicking on the wrong links when they receive a suspicious email in their inbox, or if they are accessing data that they simply have no business accessing in the first place. Sometimes businesses will even completely forget to remove employee credentials when they leave a project or the company creating a breachable hole in your network. Regardless of the reason, user error can be a detrimental occurrence, and one which must be prepared for.

Continue reading
0 Comments

Tip of the Week: Even the Most Careful People Fall For These 4 Email Mistakes

b2ap3_thumbnail_email_gaffes_400.jpgDespite the rapid advancements of business technology in the past decade, enterprises the world over are still heavily dependent upon email. Therefore, every modern worker needs to be trained on how to send a professional email. If not, classic email mistakes will be made that could bruise your company’s reputation, like these four common email blunders.

Recent comment in this post
Macey Moss
Sometimes many careful people fall in email mistakes and this may cause to lose their important data like office files. If you wan... Read More
Thursday, 13 December 2018 06:57
Continue reading
1 Comment

3 Reasons Why Humans Screw Up Technology

b2ap3_thumbnail_human_tech_issues_400.jpgTechnology is reliable. With correct coding and high-level instructions, technology will do exactly what it’s supposed to do. Yet, technology has a reputation for failing and being hard to work with. Might we be so bold as to suggest that the majority of technology problems are actually caused by humans? Here are three ways that human behavior breaks perfectly good technology.

Recent comment in this post
Carly Castaneda
People think that the technology is very difficult to use but this is very easy to use when we use it daily. 3 reason why human sc... Read More
Wednesday, 08 August 2018 05:55
Continue reading
1 Comment

Are You or Your Team a Security Threat to Your Business?

b2ap3_thumbnail_manage_your_risk_400.jpgData security should be a top priority for every business. Having good security means identifying risks. Surprisingly, some of the biggest data risks come from within. If employees aren't following your organization's data management policies, then they're your biggest threats.

Continue reading
0 Comments

Grab the Air Freshener for These 2 Stinky IT Brain Fart Stories!

b2ap3_thumbnail_it_mistakes_400.jpgWe all experience temporary mental lapses (also known as "brain farts"). The worst kind of brain flatulence is when the consequences stink up the workplace, causing downtime and loss of revenue. One of the worst places to let a brain fart rip is in the IT department.

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Cloud Internet Microsoft Software Business Computing Google Business Management Hackers Efficiency Productivity Hosted Solutions User Tips Backup Innovation Managed Service Provider Workplace Tips Malware Business IT Services Mobile Devices Computer Hardware windows Network Security Upgrade Communication IT Support Miscellaneous Saving Money Email Productivity Virtualization Data Smartphones Windows 10 Gadgets Smartphone Apps Business Continuity VoIP Server Disaster Recovery Browser Microsoft Office Mobile Device Management Small Business Network Information Technology Tech Term Social Media Mobile Computing Passwords Health Android Quick Tips Cybersecurity Going Green Holiday Operating System Data Backup Mobile Office Save Money Windows 10 Office 365 Chrome Collaboration spam Outsourced IT Cybercrime communications App Application Office Alert Best Practice Law Enforcement BYOD Marketing Managed IT Services Search Data Recovery Users Internet of Things Ransomware Employer-Employee Relationship Data Security Tablet Remote Computing Wearable Technology The Internet of Things Apple Facebook Vendor Management WiFi Bring Your Own Device Avoiding Downtime iPhone Risk Management Money Cost Management IT Support Hacking Maintenance Saving Time Router Phishing Wireless Technology BDR History User Error Mobility Remote Monitoring Antivirus Unified Threat Management Automation Hard Drives Office Tips Password Cloud Computing IT Solutions Tech Support Big Data Data Management Computers Encryption Social Telephone Systems Customer Relationship Management OneNote Government Bandwidth Current Events Phone System Wireless Information VPN Humor Two-factor Authentication Website Update Unsupported Software Net Neutrality Wi-Fi Printer Social Networking Vulnerability Shortcut Outlook Gmail USB Google Drive PowerPoint Networking Analytics Artificial Intelligence Proactive IT Firewall Lithium-ion battery Budget Recovery Laptop Augmented Reality Content Filtering Identity Theft Managed IT Services IT COnsultant Work/Life Balance Education Television Retail Excel Computer Repair Mobile Device Politics Meetings Travel Virus administration Social Engineering Applications Streaming Media Disaster Managed IT Trending Audit Entertainment Personal Information Intranet Blockchain Automobile Cleaning SaaS Value Point of Sale Save Time Data Protection Printer Server HaaS Computer Care Word Google Assistant Conferencing IT Management Programming Managing Stress hacker Twitter Storage Display Managed Service Devices Legal Amazon Transportation Paperless Office Patch Management End of Support Commerce Hosted Solution Flexibility Fax Server Business Intelligence Fraud Telephony Google Docs Customer Service Computing Biometrics Scam Uninterrupted Power Supply Sales Business Technology Hard Drive Data Storage Private Cloud Virtual Reality Wireless Charging HIPAA Access Control Mobile Security Internet Exlporer WannaCry Data Breach Human Resources Project Management DDoS Touchscreen Cortana Instant Messaging Emails Hybrid Cloud Evernote Samsung Online Currency Sports Battery Windows 8 Benefits eWaste Computer Accessories Community Chromebook Files IT solutions Comparison ISP Alexa for Business Root Cause Analysis Updates Branding HBO Identities Security Cameras Company Culture NFL Intrantet Mouse Co-Managed Services Printing Chromecast Windows 10s Specifications WIndows 7 Reputation Lifestyle Blogging Tutorial Microsoft Word Language Machine Learning Network Congestion Telephone Administrator Solid State Drive Worker Commute Regulations Keyboard Software as a Service Settings Device Security Bluetooth Downtime Windows Ink Video Games junk Hyperlink Access Co-managed IT Computer Forensics Hard Disk Drive Gifts Cameras Hiring/Firing WIndows Server 2008 User SharePoint Proactive E-Commerce Google Maps filter Wasting Time Nokia Management Credit Cards Virtual Desktop Presentation Smart Technology OneDrive Best Available Gift Giving Print Server Vendor Spyware Teamwork Websites Payment Cards Data Loss Science Youtube Accessory Robot Wireless Internet FAQ Sync Advertising Ebay Microblogging Employee-Employer Relationship Data Theft Employee Scalability Peripheral Data storage Gamification iOS Charger Buisness Experience PDF Edge Running Cable App store Break/Fix Upgrades Microsoft Excel How To Memory Computer Fan Music Near Field Communication Employer Employee Relationship Adobe Text Messaging Webinar Testing Images Screen Mirroring Ciminal Medical IT Consultant File Sharing 3D Printing Touchpad Surge Protector Financial Books IT consulting Camera Cast Admin Identity Black Market Monitors Electronic Medical Records Reliable Computing Licensing Compliance Debate Projects Help Desk IT budget Keyboard Shortcuts Distributed Denial of Service Data Privacy Webinar Legislation Bloatware Operating Sysytem Virtual Assistant Nanotechnology Workers Safety Payroll Training Tablets Inbound Marketing Windows 7