Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Can Computer Data Be Stolen Through Power Lines?

Can Computer Data Be Stolen Through Power Lines?

If you have an air-gapped computer, you probably think you're safe.  You may think that barring physical access to the machine, no hacker could possibly steal the data on that machine.  Unfortunately, you'd be incorrect.

Continue reading

Tip of the Week: 3 Pieces of Screen Reading Software

Tip of the Week: 3 Pieces of Screen Reading Software

Wouldn’t it be convenient if your business could have web pages or applications read out text for you so that you don’t have to? While most would consider this a luxury, these screen reading applications are an everyday occurrence to those who are blind, visually impaired, or have a learning disability. Even if you don’t have anyone in your office who needs screen reading, it can’t hurt to be prepared for a day when you might.

Continue reading

Lessons From a Company that Successfully Beat Ransomware

Lessons From a Company that Successfully Beat Ransomware

Ransomware is a dangerous malware that all businesses fear. Although, if the right precautions are taken, a ransomware attack can be completely thwarted. A recent hack attack of the San Francisco Municipal Transportation Agency provides us with a real-world example of this, which helps make ransomware appear a lot less formidable.

Continue reading
0 Comments

Tip of the Week: 4 Ways to Attract Top Talent to Your Company

Tip of the Week: 4 Ways to Attract Top Talent to Your Company

The ultimate goal of any business is to increase the volume of services it provides its clients in order to reap larger profits, as is likely the goal of your business as well. Perhaps you have been successful in attracting new clients, but if you wish to continue to experience such growth, then you’ll need to also attract quality employees.

Continue reading
0 Comments

These 2 Keystrokes are All that’s Needed to Access Windows 10

These 2 Keystrokes are All that’s Needed to Access Windows 10

When someone asks you to troubleshoot a problem, it’s because there is something that is preventing their solutions from working properly, which they need them to do. In business, this happens all the time. This is why every business provides some semblance of support with their product or service. What happens, however, when the act of troubleshooting makes something worse. One security analyst came across this problem in an unlikely place: Microsoft’s newest desktop operating systems, Windows 10.

Continue reading
0 Comments

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Microsoft Productivity Hackers Malware Software Business Computing Google Business Miscellaneous Workplace Tips Windows 10 Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware Mobile Devices Mobile Computing IT Services Health Communication User Tips IT Support VoIP Business Management Data Quick Tips Email Holiday Virtualization Server Smartphone Network Upgrade Mobile Device Management Office Saving Money Apps Disaster Recovery Alert Save Money Remote Computing Going Green Operating System Social Media Business Continuity Small Business Android Chrome Mobility Big Data Managed Service Provider Microsoft Office Social Application Facebook Best Practice WiFi Identity Theft Employer-Employee Relationship Ransomware Antivirus The Internet of Things Passwords Law Enforcement History Office Tips Analytics Search Gmail Password Browser Current Events Government Saving Time Lithium-ion battery Information Technology Spam Printer Bandwidth Unified Threat Management Hacking Tablet BYOD Automation Gadgets Encryption Smartphones Users USB Remote Monitoring Tech Support Wireless Money Data Management intranet Net Neutrality Firewall Streaming Media iPhone Work/Life Balance Laptop Collaboration Education User Error communications Disaster Computers Telephone Systems Hard Drives Maintenance Humor Avoiding Downtime Fraud Phone System Router Recovery Apple Network Security Cybercrime IT Solutions Risk Management VPN Private Cloud Managing Stress Wireless Technology Personal Information App Outlook Printer Server Update Budget IT Consultant Marketing Managed IT Services Fax Server Administration Data Loss Transportation Shortcut Business Intelligence Content Filtering Wearable Technology Internet Exlporer Point of Sale Biometrics Wi-Fi PowerPoint Social Engineering Proactive IT Cost Management Customer Service Telephony Flexibility Retail Online Currency BDR Virtual Reality Google Drive Entertainment DDoS Mobile Office Benefits Office 365 Amazon Blogging Travel CPU Operating Sysytem WIndows 7 Regulations Black Market Electronic Medical Records ISP Television Storage 3D Printing Two-factor Authentication Smart Phones HaaS Slow Files Bluetooth Instant Messaging Safety Trending Chromecast Customer Relationship Management Windows 8 SharePoint User Cameras Battery Excel Emergency Data Theft Administrator Vendor Management Automobile Reputation Teamwork Best Available Cleaning CloudSync Access Computing Presentation Worker Commute Meetings Science Save Time Compliance Programming Hosted Solution Prodcuctivity Video Games End of Support Running Cable Phishing Hacker Inbound Marketing Online Backup Audit Robot Networking Emails Legal Advertising Keyboard Twitter OneNote Data storage Human Resources Near Field Communication Display Politics PDF Hiring/Firing OneDrive Uninterrupted Power Supply Bring Your Own Device Scalability Experience Paperless Office Text Messaging Computer Accessories Bloatware Workplace Internet of Things Applications IT consulting How To Music Miscelllaneous Artificial Intelligence Distributed Denial of Service Mouse Website RAM Sports Touchpad Branding Ebay Books HIPAA eWaste Network Congestion

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code