Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Links Discovered Between WannaCry and North Korea

Links Discovered Between WannaCry and North Korea

In a statement given by Tom Bossert, the homeland security adviser to the White House, blame for the WannaCry attacks leveraged from May 12th to the 15th in 2017 was attributed to the Democratic People’s Republic of Korea. This assertion is in line with the conclusions that New Zealand, Australia, Canada, and Japan have come to, according to Bossert.

Continue reading
0 Comments

Sadly, the WannaCry Ransomware Disaster Could Have Been Easily Prevented

Sadly, the WannaCry Ransomware Disaster Could Have Been Easily Prevented

On May 11, 2017, the WannaCry ransomware spread around the globe like wildfire and disabled computing infrastructures belonging to organizations of all shapes and sizes. As the world watched the news unfold, it seemed as if practically no business was immune to this ultra-powerful ransomware. Yet, many quick-thinking organizations were. All because they had the foresight to follow IT best practices.

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

SecurityTip of the WeekTechnologyBest PracticesPrivacyInternetCloudMicrosoftSoftwareBusiness ComputingBusiness ManagementGoogleEfficiencyHackersProductivityHosted SolutionsBackupManaged Service ProviderUser TipsBusinessInnovationWorkplace TipsMalwareMobile DevicesIT ServicesComputerHardwarewindowsUpgradeNetwork SecurityIT SupportSaving MoneyMiscellaneousEmailWindows 10VirtualizationDataSmartphonesCommunicationSmartphoneAppsBusiness ContinuityGadgetsVoIPDisaster RecoveryProductivityMicrosoft OfficeServerMobile Device ManagementNetworkBrowserMobile ComputingInformation TechnologyTech TermSmall BusinessQuick TipsAndroidPasswordsHealthSocial MediaGoing GreenHolidayOperating SystemData BackupMobile OfficeCybersecurityChromeBest PracticeCollaborationspamSave MoneyCybercrimecommunicationsAppOffice 365ApplicationOfficeAlertEmployer-Employee RelationshipBYODLaw EnforcementMarketingManaged IT ServicesWindows 10Data RecoveryOutsourced ITRansomwareData SecurityTabletRemote ComputingSearchWearable TechnologyThe Internet of ThingsAppleUsersVendor ManagementInternet of ThingsWiFiRemote MonitoringBring Your Own DeviceMobilityAntivirusUnified Threat ManagementAvoiding DowntimeiPhoneRisk ManagementCost ManagementIT SupportMoneyHackingMaintenanceSaving TimeRouterPhishingWireless TechnologyBDRHistoryFacebookUser ErrorBandwidthHard DrivesOffice TipsPasswordIT SolutionsTech SupportBig DataData ManagementComputersEncryptionSocialTelephone SystemsCustomer Relationship ManagementOneNoteGovernmentBudgetLithium-ion batteryCurrent EventsPhone SystemAutomationWirelessVPNHumorTwo-factor AuthenticationWebsiteUpdateNet NeutralityUnsupported SoftwarePrinterSocial NetworkingCloud ComputingWi-FiShortcutOutlookVulnerabilityGmailUSBPowerPointNetworkingAnalyticsGoogle DriveProactive ITFirewallArtificial IntelligenceAuditManaged ITIntranetRecoveryLaptopBlockchainAugmented RealityContent FilteringIdentity TheftManaged IT ServicesInformationIT COnsultantEducationTelevisionWork/Life BalanceRetailExcelComputer RepairMobile DevicePoliticsTravelVirusadministrationSocial EngineeringStreaming MediaDisasterTrendingApplicationsOnline CurrencyTouchscreenCortanaEvernoteSportsEntertainmentWindows 8SamsungBenefitseWasteBatteryComputer AccessoriesPersonal InformationSaaSAutomobileValueCleaningPoint of SalePrinter ServerHaaSSave TimeData ProtectionProgrammingManaging StressTwitterComputer CareWordStorageGoogle AssistanthackerDisplayAmazonPaperless OfficeDevicesManaged ServiceLegalHosted SolutionTransportationFax ServerCommercePatch ManagementEnd of SupportBusiness IntelligenceMeetingsFlexibilityTelephonyCustomer ServiceComputingFraudBiometricsUninterrupted Power SupplySalesGoogle DocsHard DrivePrivate CloudVirtual RealityBusiness TechnologyData StorageScamHIPAAWireless ChargingInternet ExlporerAccess ControlHuman ResourcesMobile SecurityDDoSWannaCryData BreachInstant MessagingEmailsProject ManagementDistributed Denial of ServiceBlack MarketComplianceIdentityDebateHelp DeskMonitorsElectronic Medical RecordsBloatwareHybrid CloudProjectsIT budgetKeyboard ShortcutsLicensingInbound MarketingData PrivacyWebinarLegislationCommunityNanotechnologyWorkersFilesSafetyOperating SysytemVirtual AssistantISPWindows 7PayrollTrainingTabletsBrandingIntrantetMouseChromebookIT solutionsComparisonRoot Cause AnalysisUpdatesChromecastHBOAlexa for BusinessWIndows 7Co-Managed ServicesLifestyleBloggingIdentitiesSecurity CamerasTutorialCompany CultureNFLNetwork CongestionPrintingWindows 10sSpecificationsMicrosoft WordReputationRegulationsTelephoneLanguageMachine LearningBluetoothWorker CommuteAdministratorjunkSolid State DriveConferencingCo-managed ITSettingsDevice SecurityKeyboardIT ManagementCamerasSoftware as a ServiceUserHyperlinkWindows InkSharePointVideo GamesAccessfilterComputer ForensicsHard Disk DriveGiftsNokiaHiring/FiringWIndows Server 2008Virtual DesktopPresentationOneDriveBest AvailableWasting TimeGift GivingProactivePrint ServerGoogle MapsTeamworkScienceManagementYoutubeCredit CardsSpywareSmart TechnologyVendorAccessoryEbayWebsitesMicrobloggingData LossRobotWireless InternetFAQEmployee-Employer RelationshipSyncBuisnessAdvertisingPeripheralData TheftRunning CableScalabilityChargerExperienceData storageGamificationiOSEdgePDFNear Field CommunicationApp storeWebinarUpgradesMicrosoft ExcelImagesHow ToComputer FanMusic3D PrintingMemoryTestingScreen MirroringCiminalSurge ProtectorEmployer Employee RelationshipAdobeText MessagingIT consultingConsultantFile SharingBooksTouchpadFinancialCameraCastAdminReliable Computing