Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Cisco Vulnerability Requires Multiple Patches

The Cisco Vulnerability Requires Multiple Patches

Virtual private networks are vulnerable to an exploit that was recently brought to light. Cisco has announced that this exploit undermines its ASA, or Adaptive Security Appliance tool. If this issue isn’t patched immediately, you could find your organization vulnerable through remote code exploitation.

Continue reading
0 Comments

ALERT: Meltdown/Spectre Vulnerability Grants Malware Access, Patch It Today

ALERT: Meltdown/Spectre Vulnerability Grants Malware Access, Patch It Today

Mere months after the firmware in their computer chips was found to be seriously flawed, Intel’s flagship product has once again brought some unpleasant attention to the company. While the issue now has a fix, there was the possibility that a solution could depreciate the functionality of the CPU.

Continue reading
0 Comments

The Voting Machine You Use May Have Serious Security Issues

The Voting Machine You Use May Have Serious Security Issues

The ability to vote is considered one of the great rights in the world, putting one’s voice and opinion into action to shape history. However, it has been demonstrated that the electronic voting machines that some states in the U.S. use simply aren’t secure enough to ensure that the democratic process is preserved.

Continue reading
0 Comments

“The Worst” Windows Bug Discovered... and Thankfully Fixed

“The Worst” Windows Bug Discovered... and Thankfully Fixed

Microsoft has resolved what a security researcher tweeted was “the worst Windows remote code exec” in his memory. This vulnerability allowed a targeted file to implement remote code execution processes, manipulating the infected system and spreading the infection to other machines. In other word, it’s a bad problem to have. The scariest part: the attack would be triggered if a particular file were to be scanned by the Microsoft Malware Protection Engine.

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

SecurityTip of the WeekTechnologyBest PracticesPrivacyInternetCloudMicrosoftSoftwareBusiness ComputingBusiness ManagementGoogleHackersEfficiencyProductivityHosted SolutionsBackupManaged Service ProviderUser TipsWorkplace TipsMalwareBusinessInnovationMobile DevicesComputerwindowsHardwareIT ServicesUpgradeNetwork SecurityIT SupportSaving MoneyEmailMiscellaneousDataVirtualizationSmartphonesWindows 10GadgetsBusiness ContinuityCommunicationSmartphoneAppsDisaster RecoveryProductivityVoIPNetworkBrowserMicrosoft OfficeServerMobile Device ManagementTech TermSmall BusinessInformation TechnologyMobile ComputingAndroidQuick TipsHealthSocial MediaPasswordsOperating SystemMobile OfficeData BackupCybersecurityGoing GreenHolidayChromeCybercrimecommunicationsAppApplicationOfficeOffice 365AlertBest PracticeCollaborationspamSave MoneyWindows 10Data RecoveryOutsourced ITBYODRansomwareEmployer-Employee RelationshipMarketingLaw EnforcementManaged IT ServicesAppleUsersVendor ManagementWiFiThe Internet of ThingsInternet of ThingsData SecurityTabletSearchRemote ComputingWearable TechnologySaving TimeIT SupportMoneyHackingRouterHistoryPhishingWireless TechnologyBDRBring Your Own DeviceFacebookUser ErrorRemote MonitoringiPhoneMobilityAntivirusUnified Threat ManagementRisk ManagementAvoiding DowntimeCost ManagementMaintenancePasswordIT SolutionsTech SupportBig DataData ManagementComputersCustomer Relationship ManagementEncryptionSocialTelephone SystemsOneNoteGovernmentBandwidthHard DrivesOffice TipsUnsupported SoftwarePrinterCloud ComputingWi-FiShortcutOutlookVulnerabilityGmailUSBPowerPointNetworkingAnalyticsGoogle DriveProactive ITFirewallArtificial IntelligenceLithium-ion batteryBudgetCurrent EventsPhone SystemAutomationWirelessVPNTwo-factor AuthenticationHumorWebsiteSocial NetworkingNet NeutralityUpdateEducationTelevisionWork/Life BalanceRetailExcelVirusadministrationMobile DevicePoliticsTravelDisasterSocial EngineeringStreaming MediaTrendingApplicationsAuditManaged ITIntranetRecoveryLaptopBlockchainAugmented RealityIT COnsultantContent FilteringComputer RepairIdentity TheftManaged IT ServicesInformationDisplayAmazonPaperless OfficeDevicesManaged ServiceUninterrupted Power SupplySalesHard DriveLegalHosted SolutionTransportationFax ServerCommercePatch ManagementEnd of SupportBusiness IntelligenceMeetingsFlexibilityTelephonyCustomer ServiceComputingFraudBiometricsGoogle DocsPrivate CloudVirtual RealityData StorageScamBusiness TechnologyHIPAAInternet ExlporerWindows 8Wireless ChargingAccess ControlHuman ResourcesMobile SecurityDDoSInstant MessagingEmailsWannaCryData BreachProject ManagementOnline CurrencyTouchscreenCortanaSportsEntertainmentEvernoteSamsungBenefitsComputer AccessorieseWasteBatteryPersonal InformationValueSaaSAutomobileCleaningPoint of SalePrinter ServerHaaSSave TimeData ProtectionTwitterComputer CareWordProgrammingManaging StressStorageGoogle AssistanthackerUserHyperlinkMicrobloggingWindows InkSharePointVideo GamesAccessfilterComputer ForensicsHard Disk DriveGiftsHiring/FiringWIndows Server 2008Virtual DesktopPresentationOneDriveBest AvailableWasting TimeProactivePrint ServerGoogle MapsTeamworkScienceManagementCredit CardsSpywareSmart TechnologyVendorAccessoryEbayWebsitesWebinarData LossImagesRobotWireless InternetFAQSyncBuisnessAdvertisingEmployee-Employer RelationshipPeripheralData TheftRunning CableScalabilityExperienceData storageGamificationiOSChargerEdgePDFNear Field CommunicationApp storeDebateUpgradesMicrosoft ExcelHelp DeskHow ToMusic3D PrintingMemoryComputer FanScreen MirroringCiminalSurge ProtectorEmployer Employee RelationshipAdobeText MessagingIT consultingTestingConsultantFile SharingBooksTouchpadFinancialCastAdminReliable ComputingCameraComplianceIdentityDistributed Denial of ServiceBlack MarketElectronic Medical RecordsBloatwareHybrid CloudMonitorsLifestyleIT budgetKeyboard ShortcutsLicensingProjectsInbound MarketingData PrivacyWebinarLegislationFilesSafetyOperating SysytemVirtual AssistantCommunityNanotechnologyWorkersWindows 7PayrollTrainingTabletsBrandingISPIntrantetMouseChromebookIT solutionsComparisonUpdatesChromecastHBOAlexa for BusinessRoot Cause AnalysisCo-Managed ServicesBloggingIdentitiesSecurity CamerasTutorialCompany CultureNFLWIndows 7Network CongestionPrintingWindows 10sSpecificationsMicrosoft WordReputationRegulationsNokiaTelephoneGift GivingLanguageMachine LearningBluetoothWorker CommuteAdministratorjunkYoutubeSolid State DriveConferencingSettingsDevice SecurityKeyboardIT ManagementCamerasSoftware as a ServiceCo-managed IT