Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Don’t Get Scammed with Gift Cards

Don’t Get Scammed with Gift Cards

It’s the holiday season, and shoppers are flocking to stores to find the perfect gift for anyone: the gift card. However, these handy little plastic rectangles may not be so perfect after all. This year, they’ve been a key component to a business email compromise scam that has been popular in the past few months.

Continue reading
0 Comments

Getting to Know Technology: Username

Getting to Know Technology: Username

When you sign up for any service online, you will be asked to create a username and a password. Today, we will be going over the purpose of a username and provide you with some best practices on how to create a username that works to your benefit.

Continue reading
0 Comments

4 Internal Threats Every Business Owner Should Understand

4 Internal Threats Every Business Owner Should Understand

In light of all the data leaks and vulnerabilities that have been brought to light over the past few years, network security has to be a priority for every business. One problem many organizations have is that while they are protecting their network and infrastructure from threats outside their company, the real threats are actually coming from inside. Today, we’ll look at four ways threats can cause havoc from inside your organization.

Continue reading
0 Comments

Why Heart Attack Victims Should Be Wary of Hacking Attacks

Why Heart Attack Victims Should Be Wary of Hacking Attacks

It goes without saying that having to rely on a pacemaker isn’t an ideal circumstance for anyone, even considering that the device allows the patient to continue living a fulfilling life. This is why a particular discovery of a European-based research team becomes a shade or two darker: the team has concluded that it’s possible for a novice to send life-threatening signals to the device.

Continue reading
0 Comments

Passwords Are on the Way Out. What’s Next?

Passwords Are on the Way Out. What’s Next?

Passwords are a critical security component of any online account. In many cases, they’re the fine line of defense against the horde of threats that exist on the Internet. The problem that many users have with passwords, however, is that good passwords are difficult to remember, and on their own, aren’t necessarily the most secure option. So, how can you make passwords both easier to use and more secure?

Continue reading
0 Comments

New Study Shows Passwords Can, In Fact, be Remembered

b2ap3_thumbnail_people_remember_passwords_400.jpgWe see a lot of password-bashing these days, and some people have lost faith in them as a security measure. But, unfortunately, a lot of the blame for this lies in human memory. We just don’t pick passwords that are strong enough. In fact, a mind-numbing one in 20 people still use “password” to keep their information safe.

Continue reading
0 Comments

YouTube Makes an Effort to Be a Nicer Place

b2ap3_thumbnail_comments400.jpgPerouse the YouTube comments on any popular video and it will appear like a teenybopper is texting a neo nazi. The level of stupidity seen in the comments of YouTube is the ultimate proof of human idiocy. Finally, after years of putting up with people's hate and ignorance, YouTube is cracking down on comments!

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

SecurityTip of the WeekTechnologyBest PracticesPrivacyInternetCloudMicrosoftSoftwareBusiness ComputingBusiness ManagementGoogleEfficiencyHackersProductivityHosted SolutionsBackupManaged Service ProviderUser TipsInnovationWorkplace TipsMalwareBusinessMobile DevicesIT ServicesComputerHardwarewindowsUpgradeNetwork SecurityIT SupportSaving MoneyMiscellaneousEmailDataWindows 10VirtualizationSmartphonesSmartphoneCommunicationAppsBusiness ContinuityGadgetsVoIPDisaster RecoveryProductivityMicrosoft OfficeMobile Device ManagementServerNetworkBrowserMobile ComputingInformation TechnologySmall BusinessTech TermQuick TipsPasswordsAndroidHealthSocial MediaGoing GreenData BackupHolidayOperating SystemMobile OfficeCybersecurityChromeCollaborationspamSave MoneyCybercrimecommunicationsAppOffice 365ApplicationOfficeAlertBest PracticeBYODLaw EnforcementMarketingManaged IT ServicesWindows 10Data SecurityData RecoveryOutsourced ITRansomwareEmployer-Employee RelationshipRemote ComputingTabletSearchWearable TechnologyThe Internet of ThingsUsersAppleVendor ManagementWiFiInternet of ThingsBring Your Own DeviceMobilityUnified Threat ManagementAntivirusAvoiding DowntimeiPhoneRisk ManagementCost ManagementMoneyIT SupportHackingMaintenanceSaving TimeRouterWireless TechnologyPhishingBDRHistoryFacebookUser ErrorRemote MonitoringBandwidthHard DrivesOffice TipsPasswordIT SolutionsTech SupportBig DataData ManagementComputersEncryptionSocialTelephone SystemsOneNoteCustomer Relationship ManagementGovernmentBudgetLithium-ion batteryCurrent EventsPhone SystemAutomationWirelessVPNHumorTwo-factor AuthenticationWebsiteUpdateNet NeutralityUnsupported SoftwareCloud ComputingSocial NetworkingPrinterWi-FiShortcutOutlookVulnerabilityGmailUSBNetworkingPowerPointAnalyticsGoogle DriveProactive ITFirewallArtificial IntelligenceIntranetRecoveryPersonal InformationLaptopAugmented RealityContent FilteringIdentity TheftManaged IT ServicesIT COnsultantEducationTelevisionApplicationsComputer RepairWork/Life BalanceRetailExcelMobile DeviceTravelPoliticsBlockchainVirusadministrationInformationSocial EngineeringStreaming MediaDisasterTrendingAuditManaged ITBenefitsSamsungeWasteBatteryComputer AccessoriesPatch ManagementSaaSAutomobileFraudValuePoint of SaleGoogle DocsCleaningPrinter ServerHaaSBusiness TechnologySave TimeProgrammingManaging StressWireless ChargingTwitterComputer CareStorageAccess ControlMobile SecurityhackerData BreachDisplayProject ManagementAmazonCortanaPaperless OfficeLegalEvernoteHosted SolutionTransportationEnd of SupportBusiness IntelligenceFax ServerCommerceMeetingsFlexibilityComputingTelephonyCustomer ServiceBiometricsSalesHard DriveUninterrupted Power SupplyPrivate CloudVirtual RealityData StorageScamHIPAAData ProtectionWordInternet ExlporerHuman ResourcesGoogle AssistantDDoSEmailsWannaCryInstant MessagingTouchscreenManaged ServiceDevicesOnline CurrencyEntertainmentWindows 8SportsManagementCredit CardsWebinarVendorSpywareInbound MarketingData LossCommunityNanotechnologyFilesSafetyAccessoryOperating SysytemWebsitesBrandingWireless InternetISPFAQTrainingIT solutionsEmployee-Employer RelationshipIntrantetMouseSyncData TheftRoot Cause AnalysisChromecastPeripheralGamificationWIndows 7ChargerBloggingLifestyleTutorialCompany CultureWindows 10sNetwork CongestionEdgeApp storeRegulationsMicrosoft ExcelReputationBluetoothMemoryAdobeSolid State DriveWorker CommuteTestingAdministratorCiminaljunkCamerasFile SharingCo-managed ITSettingsKeyboardSharePointVideo GamesFinancialUserHard Disk DriveCameraAccessAdminfilterVirtual DesktopIdentityPresentationNokiaHiring/FiringTeamworkHybrid CloudOneDriveBest AvailableGift GivingPrint ServerLicensingYoutubeProjectsScienceIT budgetKeyboard ShortcutsData PrivacyLegislationSmart TechnologyMicrobloggingVirtual AssistantWorkersEbayTabletsWindows 7RobotPayrollBuisnessAdvertisingChromebookComparisonRunning CableScalabilityAlexa for BusinessUpdatesHBONFLiOSExperienceCo-Managed ServicesData storageIdentitiesSecurity CamerasPDFPrintingNear Field CommunicationSpecificationsUpgradesWebinarHow ToImagesMicrosoft Word3D PrintingComputer FanMusicTelephoneLanguageMachine LearningText MessagingIT consultingConferencingScreen MirroringSurge ProtectorEmployer Employee RelationshipConsultantSoftware as a ServiceDevice SecurityIT ManagementWindows InkBooksHyperlinkTouchpadComputer ForensicsReliable ComputingGiftsCastDebateDistributed Denial of ServiceBlack MarketHelp DeskComplianceWIndows Server 2008Google MapsMonitorsElectronic Medical RecordsWasting TimeBloatwareProactive