Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Can Computer Data Be Stolen Through Power Lines?

Can Computer Data Be Stolen Through Power Lines?

If you have an air-gapped computer, you probably think you're safe.  You may think that barring physical access to the machine, no hacker could possibly steal the data on that machine.  Unfortunately, you'd be incorrect.

Continue reading

Lessons From a Company that Successfully Beat Ransomware

Lessons From a Company that Successfully Beat Ransomware

Ransomware is a dangerous malware that all businesses fear. Although, if the right precautions are taken, a ransomware attack can be completely thwarted. A recent hack attack of the San Francisco Municipal Transportation Agency provides us with a real-world example of this, which helps make ransomware appear a lot less formidable.

Continue reading
0 Comments

Tip of the Week: 4 Ways to Attract Top Talent to Your Company

Tip of the Week: 4 Ways to Attract Top Talent to Your Company

The ultimate goal of any business is to increase the volume of services it provides its clients in order to reap larger profits, as is likely the goal of your business as well. Perhaps you have been successful in attracting new clients, but if you wish to continue to experience such growth, then you’ll need to also attract quality employees.

Continue reading
0 Comments

These 2 Keystrokes are All that’s Needed to Access Windows 10

These 2 Keystrokes are All that’s Needed to Access Windows 10

When someone asks you to troubleshoot a problem, it’s because there is something that is preventing their solutions from working properly, which they need them to do. In business, this happens all the time. This is why every business provides some semblance of support with their product or service. What happens, however, when the act of troubleshooting makes something worse. One security analyst came across this problem in an unlikely place: Microsoft’s newest desktop operating systems, Windows 10.

Continue reading
0 Comments

Why Heart Attack Victims Should Be Wary of Hacking Attacks

Why Heart Attack Victims Should Be Wary of Hacking Attacks

It goes without saying that having to rely on a pacemaker isn’t an ideal circumstance for anyone, even considering that the device allows the patient to continue living a fulfilling life. This is why a particular discovery of a European-based research team becomes a shade or two darker: the team has concluded that it’s possible for a novice to send life-threatening signals to the device.

Continue reading
0 Comments

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Microsoft Productivity Hackers Malware Software Business Computing Google Business Windows 10 Miscellaneous Workplace Tips Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware Mobile Devices Mobile Computing IT Services Health Communication User Tips IT Support VoIP Business Management Data Quick Tips Email Holiday Virtualization Server Smartphone Network Upgrade Mobile Device Management Office Saving Money Disaster Recovery Apps Alert Save Money Remote Computing Going Green Operating System Social Media Business Continuity Small Business Android Chrome Big Data Managed Service Provider Mobility Microsoft Office Social Facebook Application WiFi Best Practice Identity Theft Employer-Employee Relationship Antivirus Ransomware The Internet of Things Passwords Law Enforcement Analytics History Gmail Search Office Tips Browser Password Current Events Government Saving Time Information Technology Lithium-ion battery Spam Printer Bandwidth Unified Threat Management Hacking Tablet BYOD Network Security Automation Gadgets Encryption Smartphones Users USB Remote Monitoring Tech Support intranet Wireless Net Neutrality Firewall iPhone Money Streaming Media Data Management Collaboration Laptop Education User Error Work/Life Balance Computers communications Disaster Maintenance Hard Drives Telephone Systems Fraud Humor Avoiding Downtime Phone System Router Apple Recovery IT Solutions VPN Office 365 Cybercrime Risk Management Private Cloud Managing Stress Wireless Technology Outlook App Printer Server Personal Information Update IT Consultant Marketing Fax Server Administration Data Loss Budget Managed IT Services Content Filtering Transportation Shortcut Business Intelligence Wearable Technology Point of Sale Proactive IT Internet Exlporer PowerPoint Biometrics Cost Management Social Engineering Customer Service Online Currency Telephony Retail Wi-Fi BDR Entertainment Virtual Reality Flexibility Google Drive DDoS Mobile Office Benefits Blogging Music Touchpad Travel CPU Branding Amazon Regulations eWaste Network Congestion ISP Books Operating Sysytem Slow WIndows 7 3D Printing Smart Phones Television Storage Files Two-factor Authentication Black Market Windows 8 Electronic Medical Records Bluetooth Cameras HaaS Trending Instant Messaging Chromecast Data Theft Customer Relationship Management Vendor Management Safety SharePoint User Excel Battery Administrator CloudSync Emergency Reputation Teamwork Best Available Computing Automobile Access Compliance Programming Presentation Cleaning Meetings Prodcuctivity Science Hosted Solution Worker Commute Inbound Marketing Online Backup Save Time End of Support Emails Running Cable Audit Phishing Video Games Robot Twitter Networking OneNote Display Hacker Advertising Legal Data storage Human Resources OneDrive Near Field Communication Keyboard PDF Bring Your Own Device Uninterrupted Power Supply Paperless Office Politics Workplace Hiring/Firing Text Messaging Computer Accessories Bloatware Scalability Internet of Things Miscelllaneous Website Experience Applications RAM IT consulting Ebay Artificial Intelligence Distributed Denial of Service Mouse How To Sports HIPAA

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code