Blog

Security Tip 3

use 2 factor authentication to be safe when accessing your e-mails or social media accounts on untrusted or public computers

Read More >

Password Hardening

As computer processing power increases the security of traditional passwords decreases due to vulnerability to what is known as dictionary attacks or brute force attacks. These are attacks where an

Read More >

Security Tip 2

Avoid entering sensitive data like your credit card numbers or any other financial or sensitive information into any public computer.

Read More >

Security Tip

Always log out of websites by clicking “log out” on the site. It’s not enough to simply close the browser window or go to another website.

Read More >

Things you didn’t know Gmail can do

  1. Dot’s Don’t Mean Anything:  If your e-mail is mr.exeo[at]gmail.com you will an e-mail if it was addressed to mrexeo[at]gmail.com or m.r.e.x.e.o[at]gmail.com. Actually the dot’s don’t change anything at

Read More >

6 Benefits of the Cloud

Cost Efficiency Traditional Information technology systems rely on software that puts many overhead costs on companies. Added to the purchase prices, the licensing fees for multiple users can prove to

Read More >

The Connected Car

Today, smartphones and tablets have become an essential part of any computing experience. They take a special importance in the world of business as they continually to provide tools and

Read More >

What is M2M?

If Sci-Fi movies have taught us anything, it is that in the future machines will be able to communicate and make decisions by themselves. The future is actually already here

Read More >

Get the most out of your WiFi

Today’s homes and offices don’t feel right without having a good WiFi connection access. After all, home is where WiFi connects automatically. In the following we look at simple tips

Read More >

Get in touch

We respond within 1 hour on weekdays

EXEO Logo white

Paris. Beirut. Dubai.