Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Cisco Vulnerability Requires Multiple Patches

The Cisco Vulnerability Requires Multiple Patches

Virtual private networks are vulnerable to an exploit that was recently brought to light. Cisco has announced that this exploit undermines its ASA, or Adaptive Security Appliance tool. If this issue isn’t patched immediately, you could find your organization vulnerable through remote code exploitation.

Continue reading
0 Comments

ALERT: Meltdown/Spectre Vulnerability Grants Malware Access, Patch It Today

ALERT: Meltdown/Spectre Vulnerability Grants Malware Access, Patch It Today

Mere months after the firmware in their computer chips was found to be seriously flawed, Intel’s flagship product has once again brought some unpleasant attention to the company. While the issue now has a fix, there was the possibility that a solution could depreciate the functionality of the CPU.

Continue reading
0 Comments

The Voting Machine You Use May Have Serious Security Issues

The Voting Machine You Use May Have Serious Security Issues

The ability to vote is considered one of the great rights in the world, putting one’s voice and opinion into action to shape history. However, it has been demonstrated that the electronic voting machines that some states in the U.S. use simply aren’t secure enough to ensure that the democratic process is preserved.

Continue reading
0 Comments

“The Worst” Windows Bug Discovered... and Thankfully Fixed

“The Worst” Windows Bug Discovered... and Thankfully Fixed

Microsoft has resolved what a security researcher tweeted was “the worst Windows remote code exec” in his memory. This vulnerability allowed a targeted file to implement remote code execution processes, manipulating the infected system and spreading the infection to other machines. In other word, it’s a bad problem to have. The scariest part: the attack would be triggered if a particular file were to be scanned by the Microsoft Malware Protection Engine.

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Cloud Internet Microsoft Software Business Computing Google Business Management Hackers Efficiency Productivity Hosted Solutions User Tips Backup Managed Service Provider Innovation Malware Business Workplace Tips Mobile Devices IT Services Computer Hardware windows Upgrade Network Security Communication IT Support Miscellaneous Saving Money Email Productivity Smartphones Data Virtualization Windows 10 Gadgets Business Continuity Apps Smartphone VoIP Disaster Recovery Server Browser Microsoft Office Small Business Network Mobile Device Management Social Media Information Technology Mobile Computing Tech Term Quick Tips Passwords Health Android Cybersecurity Holiday Data Backup Going Green Operating System Mobile Office Save Money Chrome Office 365 Windows 10 Outsourced IT Cybercrime communications App Application Office Alert Best Practice Collaboration spam Users Data Recovery BYOD Marketing Data Security Search Law Enforcement Internet of Things Ransomware Employer-Employee Relationship Managed IT Services Apple Vendor Management WiFi Remote Computing Bring Your Own Device The Internet of Things Tablet Facebook Wearable Technology History Hacking Router iPhone Phishing Wireless Technology BDR Mobility Risk Management Cost Management User Error Remote Monitoring Maintenance Saving Time Antivirus Unified Threat Management IT Support Money Avoiding Downtime Office Tips Password IT Solutions Tech Support Big Data Data Management Computers Encryption Social Hard Drives Telephone Systems OneNote Government Bandwidth Automation Cloud Computing Customer Relationship Management Humor Two-factor Authentication Vulnerability Website Update Net Neutrality Printer Google Drive Outlook Shortcut Artificial Intelligence Gmail USB PowerPoint Networking Analytics Proactive IT Firewall Wireless Social Networking Information Budget Lithium-ion battery Unsupported Software Current Events Phone System Wi-Fi VPN Mobile Device Politics Disaster Education Television Retail Excel Meetings Applications Travel Managed IT Social Engineering IT COnsultant Blockchain Personal Information Streaming Media Computer Repair Identity Theft Trending Managed IT Services Audit Entertainment Intranet Virus Recovery Work/Life Balance Laptop Augmented Reality Content Filtering administration Flexibility Programming Managing Stress Twitter Fraud Storage Google Docs Display Business Technology Data Storage Scam Amazon Windows 8 Paperless Office Wireless Charging Hosted Solution Access Control Business Intelligence Fax Server Mobile Security WannaCry Data Breach Telephony Project Management Customer Service Computing Biometrics Touchscreen Cortana Evernote Hybrid Cloud Private Cloud Virtual Reality Samsung Battery HIPAA Internet Exlporer Automobile Human Resources DDoS Cleaning Instant Messaging Emails Save Time Data Protection Online Currency Sports Computer Care Word Conferencing Google Assistant Benefits eWaste Computer Accessories IT Management hacker Uninterrupted Power Supply Sales Hard Drive Managed Service SaaS Devices Value Legal Point of Sale Printer Server Transportation HaaS Commerce Patch Management End of Support Accessory Websites Payment Cards Data Loss Regulations FAQ Robot Wireless Internet Bluetooth Employee-Employer Relationship Sync junk Advertising Scalability Co-managed IT Peripheral Data Theft Employee Cameras iOS Charger User Experience Data storage Debate Help Desk Gamification SharePoint Edge filter PDF How To App store Break/Fix Virtual Desktop Upgrades Microsoft Excel Presentation Teamwork Computer Fan OneDrive Best Available Music Print Server Memory Testing Screen Mirroring Ciminal Science Employer Employee Relationship Adobe Text Messaging Medical IT Consultant File Sharing Books Ebay Touchpad Financial Camera Cast Admin Black Market Lifestyle Identity Buisness Running Cable Monitors Electronic Medical Records Projects IT budget Keyboard Shortcuts Licensing Near Field Communication Data Privacy Webinar Legislation Nanotechnology Workers Safety Operating Sysytem Virtual Assistant Windows 7 Payroll Training Tablets 3D Printing IT consulting Surge Protector Chromebook IT solutions Comparison Root Cause Analysis Updates HBO Alexa for Business Co-Managed Services Identities Security Cameras Company Culture NFL Nokia Reliable Computing Gift Giving Printing Windows 10s Specifications Distributed Denial of Service Microsoft Word Compliance Reputation Youtube Telephone Language Machine Learning Bloatware Worker Commute Administrator Microblogging Solid State Drive Software as a Service Settings Device Security Keyboard Inbound Marketing Community Hyperlink Files Downtime Windows Ink Video Games Hard Disk Drive Gifts ISP Access Computer Forensics Branding Intrantet Mouse Hiring/Firing WIndows Server 2008 Wasting Time Chromecast Proactive E-Commerce Google Maps Credit Cards WIndows 7 Blogging Webinar Tutorial Images Management Vendor Spyware Network Congestion Smart Technology