Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

David M. Lay

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A veteran of the IT industry with over 30 years experience managing and maintaining IT resources for small and medium sized businesses.

Can Computer Data Be Stolen Through Power Lines?

Can Computer Data Be Stolen Through Power Lines?

If you have an air-gapped computer, you probably think you're safe.  You may think that barring physical access to the machine, no hacker could possibly steal the data on that machine.  Unfortunately, you'd be incorrect.

Continue reading

Tip of the Week: 3 Pieces of Screen Reading Software

Tip of the Week: 3 Pieces of Screen Reading Software

Wouldn’t it be convenient if your business could have web pages or applications read out text for you so that you don’t have to? While most would consider this a luxury, these screen reading applications are an everyday occurrence to those who are blind, visually impaired, or have a learning disability. Even if you don’t have anyone in your office who needs screen reading, it can’t hurt to be prepared for a day when you might.

Continue reading

Lessons From a Company that Successfully Beat Ransomware

Lessons From a Company that Successfully Beat Ransomware

Ransomware is a dangerous malware that all businesses fear. Although, if the right precautions are taken, a ransomware attack can be completely thwarted. A recent hack attack of the San Francisco Municipal Transportation Agency provides us with a real-world example of this, which helps make ransomware appear a lot less formidable.

Continue reading
0 Comments

Tip of the Week: 4 Ways to Attract Top Talent to Your Company

Tip of the Week: 4 Ways to Attract Top Talent to Your Company

The ultimate goal of any business is to increase the volume of services it provides its clients in order to reap larger profits, as is likely the goal of your business as well. Perhaps you have been successful in attracting new clients, but if you wish to continue to experience such growth, then you’ll need to also attract quality employees.

Continue reading
0 Comments

These 2 Keystrokes are All that’s Needed to Access Windows 10

These 2 Keystrokes are All that’s Needed to Access Windows 10

When someone asks you to troubleshoot a problem, it’s because there is something that is preventing their solutions from working properly, which they need them to do. In business, this happens all the time. This is why every business provides some semblance of support with their product or service. What happens, however, when the act of troubleshooting makes something worse. One security analyst came across this problem in an unlikely place: Microsoft’s newest desktop operating systems, Windows 10.

Continue reading
0 Comments

Why Heart Attack Victims Should Be Wary of Hacking Attacks

Why Heart Attack Victims Should Be Wary of Hacking Attacks

It goes without saying that having to rely on a pacemaker isn’t an ideal circumstance for anyone, even considering that the device allows the patient to continue living a fulfilling life. This is why a particular discovery of a European-based research team becomes a shade or two darker: the team has concluded that it’s possible for a novice to send life-threatening signals to the device.

Continue reading
0 Comments

Tip of the Week: Make Sure Your Mobile Device Policy Covers These 3 Areas

Tip of the Week: Make Sure Your Mobile Device Policy Covers These 3 Areas

If we asked you to count the number of mobile devices in your workplace, would you be able to do so? This includes smartphones, laptops, tablets, and others--anything that’s not a workstation or hardware tied down to your location. While mobile devices can be beneficial for any business, it’s still important to keep security at the top of your mind. Here are three topics that you need to be sure you’ve considered before allowing mobile devices in the workplace.

Continue reading
0 Comments

How Businesses Doing IT the Old Fashioned Way are Losing Money

How Businesses Doing IT the Old Fashioned Way are Losing Money

Technology has been ingrained into today’s society to the point where businesses can’t function without it. Your organization relies on servers, networks, and workstations to keep productive and access important information, but all of this technology saddles your business with the responsibility of maintaining the components, as well as budget challenges.

Continue reading
0 Comments

Passwords Are on the Way Out. What’s Next?

Passwords Are on the Way Out. What’s Next?

Passwords are a critical security component of any online account. In many cases, they’re the fine line of defense against the horde of threats that exist on the Internet. The problem that many users have with passwords, however, is that good passwords are difficult to remember, and on their own, aren’t necessarily the most secure option. So, how can you make passwords both easier to use and more secure?

Tags:
Continue reading
0 Comments

Tip of the Week: 3 Tips to Cleaning a Computer that Anyone Can Do

Tip of the Week: 3 Tips to Cleaning a Computer that Anyone Can Do

When you invest in a new computing device, you should know that a little bit of tender loving care goes a long way toward prolonging its lifespan. Yet, cleaning your device can be a bit tricky, especially if you don’t want to risk permanent damage to its components. Thankfully, it’s not rocket science to clean up your PC, especially when you have this step-by-step guide.

Continue reading
0 Comments

Why Small Businesses Need to Think Big When it Comes to Network Security

Why Small Businesses Need to Think Big When it Comes to Network Security

There are benefits to being a small business. Being small provides all sorts of flexibility, including the ability to make decisions quickly and without having to go through so many hoops. Plus, you have a smaller workforce, which makes for a more personal experience. However, this also leads to a rather unfortunate side-effect of believing that you’re immune to being hacked.

Continue reading
0 Comments

For Emergency Purposes Only: Users Can Now Activate Facebook’s Safety Check

For Emergency Purposes Only: Users Can Now Activate Facebook’s Safety Check

Since 2014, Facebook has quietly featured Safety Check, a crisis response tool that lets users in areas struck by natural disasters or other emergencies to confirm their safety on the social network. Originally, Facebook itself would have to activate a Safety Check, but that has changed--the power to activate a safety check is now in the hands of the stricken community.

Continue reading
0 Comments

Tip of the Week: 3 Simple Tricks to Resolve a Troublesome Wi-Fi Connection

Tip of the Week: 3 Simple Tricks to Resolve a Troublesome Wi-Fi Connection

The dreaded Wi-Fi dead zone: it’s a place where all wireless signal drops or becomes unstable, even though you could move three inches in either direction and you’ll have no problem. In this case, there’s usually something interfering with the signal, be it a wall or another device. We’ll walk you through some of the basic troubleshooting tips that you can use to resolve your connection troubles.

Continue reading
0 Comments

Honor Among Hackers? Not for Those Who Hack Hospitals

Honor Among Hackers? Not for Those Who Hack Hospitals

It’s safe to say that hacking is a frowned-upon practice, but that hasn’t stopped cyber criminals from attempting to turn a profit off of it. This practice has led them to target nonconventional organizations, including hospitals and other healthcare facilities. However, just because a hacker can target a hospital, does this mean that they should? This is a topic of some debate amongst hackers, whom, believe it or not, actually do have some sort of ethical standards.

Continue reading
0 Comments

What Kind of a Story Do Readers Want? Big Data Knows

What Kind of a Story Do Readers Want? Big Data Knows

Sometimes it can be tricky to identify what will be popular in the years to come, but that doesn’t stop big data from trying. Cultural anomalies are particularly difficult to predict, but an algorithm is attempting to predict which modern novel will become the next big bestseller. Jodie Archer, author of an upcoming book titled The Bestseller Code: Anatomy of the Blockbuster Novel, takes a critical look at what makes something popular amongst consumers--particularly in regard to literature.

Continue reading
0 Comments

Tip of the Week: These Windows 10 Shortcuts are Worth Committing to Memory

Tip of the Week: These Windows 10 Shortcuts are Worth Committing to Memory

A mouse is practically necessary when using a computer, be it for working with documents or for browsing the Internet. However, that shouldn’t stop you from using key command shortcuts to cut down on the number of clicks you need to make. With Windows 10, there are plenty of shortcuts that can be used to accomplish more throughout the workday.

Recent comment in this post
DianaBHeady
Yes, I agreed with that these Windows 10 shortcuts are worth committing to memory and very important for me to learn about this. I... Read More
Tuesday, 13 November 2018 00:09
Continue reading
1 Comment

You Won’t Believe What Happens to a PC After Plugging in this USB Device!

You Won’t Believe What Happens to a PC After Plugging in this USB Device!

USB is a popular technology in all modes of today’s society. You’d be hard-pressed to find a modern piece of technology that’s not compatible in some way, shape or form with USB. Thumb drives, chargers, and even portable drives all use this common technology. However, this also means that hackers can take advantage of its popularity to spread malware and other problems.

Continue reading
0 Comments

A Pocket Guide to Cloud Computing

A Pocket Guide to Cloud Computing

There is no question that, by now, you have heard of the cloud. The computing method has grown to be an essential component for any business to consider. But what does “the cloud” actually refer to, and what must a business owner consider as they select a solution for their needs?

Continue reading
0 Comments

Tip of the Week: Maximize Productivity By Listening to the Right Music

Tip of the Week: Maximize Productivity By Listening to the Right Music

Nowadays, with streaming services like Spotify, Google Play, and Pandora available on a plethora of mobile devices, music lovers have an easy time enjoying tunes everywhere they go, including at the office. While this is all well and good, have you ever stopped to wonder if music is helping your employees, or holding them back?

Continue reading
0 Comments

Why You Should Read the Fine Print Before Downloading Adware

Why You Should Read the Fine Print Before Downloading Adware

Has this ever happened to you? You come across a free app online that seems interesting, entertaining, or helpful so you decide to download it? However, as soon as you click the download button you regret it as it begins to install browser toolbars, adware, and other annoying (and potentially dangerous) software onto your device? How can you keep this “crapware” from getting too out of hand, and why is it so popular in the first place?

Continue reading
0 Comments

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Microsoft Productivity Hackers Malware Business Computing Google Business Software Windows 10 Miscellaneous Workplace Tips Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware Mobile Devices Mobile Computing IT Services Health Communication User Tips IT Support VoIP Business Management Email Holiday Virtualization Server Network Smartphone Data Quick Tips Office Disaster Recovery Apps Alert Save Money Remote Computing Going Green Operating System Business Continuity Social Media Mobile Device Management Upgrade Saving Money Android Chrome Small Business Employer-Employee Relationship Microsoft Office Ransomware Social Facebook WiFi Identity Theft Antivirus Application The Internet of Things Best Practice Big Data Mobility Managed Service Provider Analytics History Search Gmail Browser Current Events Saving Time Government Lithium-ion battery Law Enforcement Printer Information Technology Office Tips Spam Bandwidth Password Unified Threat Management Hacking BYOD Tablet Passwords Smartphones Telephone Systems Remote Monitoring Users USB Humor Tech Support Wireless Recovery intranet Firewall Net Neutrality iPhone Network Security Automation Collaboration Laptop Streaming Media Work/Life Balance Education User Error Maintenance Computers Disaster Hard Drives Fraud Avoiding Downtime Phone System Money Data Management Router Apple communications Encryption Gadgets Virtual Reality App Google Drive Personal Information Outlook DDoS Printer Server Benefits IT Consultant Fax Server Marketing Data Loss Managed IT Services Administration Cybercrime Risk Management Wearable Technology Content Filtering Proactive IT Private Cloud Point of Sale Managing Stress Wi-Fi Wireless Technology PowerPoint Cost Management Online Currency Flexibility Retail Update BDR Entertainment Budget Mobile Office Transportation Shortcut Business Intelligence Office 365 Internet Exlporer VPN Biometrics Social Engineering IT Solutions Telephony Customer Service Windows 8 PDF Instant Messaging Uninterrupted Power Supply Safety Computer Accessories Vendor Management Cameras Text Messaging Battery Internet of Things Emergency Bloatware Data Theft Applications IT consulting Computing Mouse Artificial Intelligence Distributed Denial of Service Automobile Sports Cleaning CloudSync Touchpad Branding Worker Commute Prodcuctivity Network Congestion eWaste Programming Save Time Compliance Online Backup Operating Sysytem Video Games WIndows 7 Storage Television Files Hacker Two-factor Authentication Inbound Marketing Emails Audit Bluetooth Legal Display Trending OneNote Chromecast Keyboard Customer Relationship Management Twitter SharePoint User Politics Excel OneDrive Administrator Hiring/Firing Bring Your Own Device Reputation Teamwork Scalability Best Available Experience Paperless Office Workplace Access Presentation Website RAM Meetings How To Hosted Solution Music Science Ebay Miscelllaneous Phishing Blogging CPU End of Support Running Cable Amazon Books HIPAA Travel Robot Networking Regulations Slow Advertising Black Market Smart Phones ISP Electronic Medical Records Data storage 3D Printing Human Resources HaaS Near Field Communication

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code