Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Can Computer Data Be Stolen Through Power Lines?

Can Computer Data Be Stolen Through Power Lines?

If you have an air-gapped computer, you probably think you're safe.  You may think that barring physical access to the machine, no hacker could possibly steal the data on that machine.  Unfortunately, you'd be incorrect.

Continue reading

Tip of the Week: 3 Pieces of Screen Reading Software

Tip of the Week: 3 Pieces of Screen Reading Software

Wouldn’t it be convenient if your business could have web pages or applications read out text for you so that you don’t have to? While most would consider this a luxury, these screen reading applications are an everyday occurrence to those who are blind, visually impaired, or have a learning disability. Even if you don’t have anyone in your office who needs screen reading, it can’t hurt to be prepared for a day when you might.

Continue reading

Lessons From a Company that Successfully Beat Ransomware

Lessons From a Company that Successfully Beat Ransomware

Ransomware is a dangerous malware that all businesses fear. Although, if the right precautions are taken, a ransomware attack can be completely thwarted. A recent hack attack of the San Francisco Municipal Transportation Agency provides us with a real-world example of this, which helps make ransomware appear a lot less formidable.

Continue reading
0 Comments

Tip of the Week: 4 Ways to Attract Top Talent to Your Company

Tip of the Week: 4 Ways to Attract Top Talent to Your Company

The ultimate goal of any business is to increase the volume of services it provides its clients in order to reap larger profits, as is likely the goal of your business as well. Perhaps you have been successful in attracting new clients, but if you wish to continue to experience such growth, then you’ll need to also attract quality employees.

Continue reading
0 Comments

These 2 Keystrokes are All that’s Needed to Access Windows 10

These 2 Keystrokes are All that’s Needed to Access Windows 10

When someone asks you to troubleshoot a problem, it’s because there is something that is preventing their solutions from working properly, which they need them to do. In business, this happens all the time. This is why every business provides some semblance of support with their product or service. What happens, however, when the act of troubleshooting makes something worse. One security analyst came across this problem in an unlikely place: Microsoft’s newest desktop operating systems, Windows 10.

Continue reading
0 Comments

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Software Business Computing Google Business Miscellaneous Windows 10 Workplace Tips Innovation Computer Backup Efficiency Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing IT Support User Tips Communication Business Management VoIP Server Network Smartphone Data Quick Tips Email Holiday Virtualization Save Money Remote Computing Going Green Business Continuity Operating System Mobile Device Management Social Media Upgrade Saving Money Office Apps Disaster Recovery Alert Chrome Small Business Android WiFi Employer-Employee Relationship Identity Theft Ransomware Antivirus The Internet of Things Big Data Managed Service Provider Microsoft Office Application Social Mobility Facebook Best Practice Saving Time Government Lithium-ion battery Information Technology Printer Spam Bandwidth Unified Threat Management Hacking BYOD Tablet Passwords Law Enforcement Office Tips Password Analytics History Gmail Search Browser Current Events Education Telephone Systems User Error Wireless Humor Hard Drives Computers Maintenance Disaster Fraud Recovery Avoiding Downtime Work/Life Balance Phone System Network Security Router Automation Apple Encryption Gadgets Smartphones Users Remote Monitoring USB Tech Support Data Management Money intranet Net Neutrality Firewall iPhone Collaboration Laptop communications Streaming Media Telephony Personal Information Customer Service Content Filtering Proactive IT Point of Sale Virtual Reality PowerPoint Online Currency Cost Management Google Drive DDoS Managed IT Services Retail BDR Benefits Entertainment Mobile Office Cybercrime Wi-Fi Risk Management Flexibility Managing Stress VPN Private Cloud IT Solutions Wireless Technology Update App Outlook Printer Server Office 365 Budget Fax Server IT Consultant Business Intelligence Transportation Shortcut Marketing Data Loss Internet Exlporer Administration Biometrics Social Engineering Wearable Technology Near Field Communication Inbound Marketing Data storage Battery Human Resources Emergency Emails Audit PDF Uninterrupted Power Supply Display Twitter OneNote Automobile Cleaning Computer Accessories Text Messaging Internet of Things Bloatware IT consulting OneDrive Applications Worker Commute Save Time Distributed Denial of Service Mouse Bring Your Own Device Artificial Intelligence Sports Video Games Paperless Office Workplace Touchpad Branding Hacker eWaste Network Congestion Website RAM Legal Ebay Miscelllaneous WIndows 7 Operating Sysytem Keyboard Television Storage Amazon Blogging CPU HIPAA Files Two-factor Authentication Bluetooth Travel Politics Slow Hiring/Firing Trending Smart Phones Regulations ISP Chromecast Scalability Customer Relationship Management SharePoint User 3D Printing Experience Excel Windows 8 Administrator How To Music Teamwork Best Available Reputation Cameras Vendor Management Presentation Data Theft Access Books Meetings Hosted Solution Science Computing CloudSync Black Market Electronic Medical Records Running Cable Phishing End of Support HaaS Prodcuctivity Compliance Programming Robot Instant Messaging Networking Safety Online Backup Advertising

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code