Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Cisco Vulnerability Requires Multiple Patches

The Cisco Vulnerability Requires Multiple Patches

Virtual private networks are vulnerable to an exploit that was recently brought to light. Cisco has announced that this exploit undermines its ASA, or Adaptive Security Appliance tool. If this issue isn’t patched immediately, you could find your organization vulnerable through remote code exploitation.

Continue reading
0 Comments

ALERT: Meltdown/Spectre Vulnerability Grants Malware Access, Patch It Today

ALERT: Meltdown/Spectre Vulnerability Grants Malware Access, Patch It Today

Mere months after the firmware in their computer chips was found to be seriously flawed, Intel’s flagship product has once again brought some unpleasant attention to the company. While the issue now has a fix, there was the possibility that a solution could depreciate the functionality of the CPU.

Continue reading
0 Comments

The Voting Machine You Use May Have Serious Security Issues

The Voting Machine You Use May Have Serious Security Issues

The ability to vote is considered one of the great rights in the world, putting one’s voice and opinion into action to shape history. However, it has been demonstrated that the electronic voting machines that some states in the U.S. use simply aren’t secure enough to ensure that the democratic process is preserved.

Continue reading
0 Comments

“The Worst” Windows Bug Discovered... and Thankfully Fixed

“The Worst” Windows Bug Discovered... and Thankfully Fixed

Microsoft has resolved what a security researcher tweeted was “the worst Windows remote code exec” in his memory. This vulnerability allowed a targeted file to implement remote code execution processes, manipulating the infected system and spreading the infection to other machines. In other word, it’s a bad problem to have. The scariest part: the attack would be triggered if a particular file were to be scanned by the Microsoft Malware Protection Engine.

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

SecurityTip of the WeekTechnologyBest PracticesPrivacyInternetCloudMicrosoftBusiness ComputingHackersSoftwareGoogleEfficiencyBusiness ManagementInnovationHosted SolutionsProductivityBackupWorkplace TipsUser TipsManaged Service ProviderMalwareMobile DevicesBusinessNetwork SecurityIT ServicesHardwarewindowsProductivityUpgradeComputerEmailDataCommunicationGadgetsSmartphonesIT SupportMiscellaneousSaving MoneyVirtualizationWindows 10AppsSmartphoneSmall BusinessNetworkDisaster RecoveryBusiness ContinuityBrowserVoIPServerMicrosoft OfficeMobile Device ManagementHealthMobile ComputingTech TermSocial MediaAndroidInformation TechnologyQuick TipsPasswordsCybersecurityWindows 10Mobile OfficeOffice 365Going GreenHolidayData BackupOperating SystemData RecoveryChromecommunicationsSave MoneyOfficeAppAlertUsersBest PracticeOutsourced ITCybercrimeCollaborationBYODApplicationInternet of ThingsEmployer-Employee RelationshipspamData SecurityIT SupportMarketingRansomwareLaw EnforcementSearchManaged IT ServicesThe Internet of ThingsFacebookAppleVendor ManagementWiFiPhishingBring Your Own DeviceRemote ComputingTabletWirelessWearable TechnologySaving TimeBDRMoneyUser ErrorHistoryHackingRemote MonitoringAntivirusUnified Threat ManagementAvoiding DowntimeiPhoneMobilityRisk ManagementCost ManagementAutomationRouterMaintenanceWireless TechnologyCloud ComputingOffice TipsOneNoteGovernmentPasswordCustomer Relationship ManagementBandwidthData ManagementComputersSocialTelephone SystemsArtificial IntelligenceHard DrivesIT SolutionsTech SupportBig DataEncryptionUnsupported SoftwareTwo-factor AuthenticationPowerPointUpdateAnalyticsWi-FiProactive ITFirewallInformationVulnerabilityShortcutLithium-ion batteryCurrent EventsGoogle DriveNetworkingVPNHumorWebsiteNet NeutralityEducationBudgetPrinterPhone SystemOutlookManaged IT ServicesSocial NetworkingGmailUSBBlockchainWork/Life BalanceVirusadministrationStreaming MediaExcelMobile DeviceTrendingWordPoliticsAuditDisasterMeetingsTelephonyIntranetTravelManaged ServiceLaptopAugmented RealityContent FilteringSocial EngineeringManaged ITBatteryTelevisionRetailPersonal InformationEntertainmentPaperless OfficeIT COnsultantRecoveryComputer RepairApplicationsIdentity TheftManaging StressStorageUninterrupted Power SupplySalesLegalHard DriveTransportationEnd of SupportPrintingCommerceData ProtectionFlexibilityConferencingHosted SolutionOnline CurrencyGoogle AssistantIT ManagementBusiness IntelligenceData StorageScamCustomer ServiceDevicesBiometricsWindows 8Private CloudVirtual RealityPatch ManagementPoint of SalePrinter ServerHIPAAWannaCryInternet ExlporerFraudTouchscreenHuman ResourcesDDoSProgrammingTwitterGoogle DocsSamsungInstant MessagingEmailsBusiness TechnologyDisplayWireless ChargingSportsAmazonBenefitsAutomobileFile SharingeWasteCleaningOneDriveComputer AccessoriesMobile SecurityData BreachFax ServerProject ManagementCortanaSaaSSave TimeValueHybrid CloudEvernoteComputer CareComputingYoutubeAccess ControlHaaShackerVirtual AssistantWorkersMicrobloggingVideo GamesRegulationsAccessWindows 7Hard Disk DriveAdminTabletsBluetooth5GComparisonHiring/FiringjunkChromebookAlexa for BusinessUpdatesHBO3D PrintingCamerasUserCo-Managed ServicesSurge ProtectorIdentitiesKeyboard ShortcutsNFLSharePointEmployeesSpecificationsSmart TechnologyfilterMicrosoft WordWebinarVirtual DesktopImagesPresentationBest AvailableRobotTelephoneLanguagePayrollTeamworkVoice over Internet ProtocolScienceAdvertisingSoftware as a ServiceDevice SecurityScalabilityExperienceData storageHyperlinkiOSSecurity CamerasWindows InkSabotageGiftsPDFComputer ForensicsCommunityUpgradesDebateWIndows Server 2008BuisnessHow ToHelp DeskMusicISPWasting TimeProactiveComputer FanMachine LearningGoogle MapsRunning CableScreen MirroringPCCredit CardsEmployer Employee RelationshipIntrantetText MessagingManagementVendorSpywareConsultantNear Field CommunicationBooksTouchpadBloggingAccessoryTutorialWebsitesDowntimeData LossCastSmartwatchFAQWireless InternetEmployee-Employer RelationshipSyncBlack MarketIT consultingElectronic Medical RecordsPeripheralData TheftMonitorsE-CommerceGamificationLifestyleServer MaintenanceChargerReliable ComputingCo-managed ITEdgeWebinarPayment CardsMicrosoft ExcelDistributed Denial of ServiceSafetyOperating SysytemComplianceApp storeNanotechnologyMemoryInvestmentTrainingBloatwareTestingCiminalIT solutionsAdobeEmployeeInbound MarketingPrint ServerRoot Cause AnalysisFinancialROIFilesCompany CultureCameraWindows 10sBrandingBreak/FixMouseReputationEbayIdentityNokiaGift GivingChromecastWIndows 7AdministratorProjectsIT budgetSolid State DriveLicensingWorker CommuteMedical ITLegislationKeyboardNetwork CongestionData PrivacySettings