Contact us today!
(469) 567-0181
(903) 458-9400
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Can Computer Data Be Stolen Through Power Lines?

Can Computer Data Be Stolen Through Power Lines?

If you have an air-gapped computer, you probably think you're safe.  You may think that barring physical access to the machine, no hacker could possibly steal the data on that machine.  Unfortunately, you'd be incorrect.

Continue reading

Lessons From a Company that Successfully Beat Ransomware

Lessons From a Company that Successfully Beat Ransomware

Ransomware is a dangerous malware that all businesses fear. Although, if the right precautions are taken, a ransomware attack can be completely thwarted. A recent hack attack of the San Francisco Municipal Transportation Agency provides us with a real-world example of this, which helps make ransomware appear a lot less formidable.

Continue reading
0 Comments

Tip of the Week: 4 Ways to Attract Top Talent to Your Company

Tip of the Week: 4 Ways to Attract Top Talent to Your Company

The ultimate goal of any business is to increase the volume of services it provides its clients in order to reap larger profits, as is likely the goal of your business as well. Perhaps you have been successful in attracting new clients, but if you wish to continue to experience such growth, then you’ll need to also attract quality employees.

Continue reading
0 Comments

These 2 Keystrokes are All that’s Needed to Access Windows 10

These 2 Keystrokes are All that’s Needed to Access Windows 10

When someone asks you to troubleshoot a problem, it’s because there is something that is preventing their solutions from working properly, which they need them to do. In business, this happens all the time. This is why every business provides some semblance of support with their product or service. What happens, however, when the act of troubleshooting makes something worse. One security analyst came across this problem in an unlikely place: Microsoft’s newest desktop operating systems, Windows 10.

Recent comment in this post
Clio Conrad
Key strokes have some of the parts that were possible through subscriber on this article you need to have some access on this. I w... Read More
Thursday, 11 July 2019 23:14
Continue reading
1 Comment

Why Heart Attack Victims Should Be Wary of Hacking Attacks

Why Heart Attack Victims Should Be Wary of Hacking Attacks

It goes without saying that having to rely on a pacemaker isn’t an ideal circumstance for anyone, even considering that the device allows the patient to continue living a fulfilling life. This is why a particular discovery of a European-based research team becomes a shade or two darker: the team has concluded that it’s possible for a novice to send life-threatening signals to the device.

Recent comment in this post
Ashton Brewer
Victims of the heart attack are found here or the comfort use of the offs for people. It is sorted for the movement of the https:/... Read More
Friday, 09 August 2019 00:12
Continue reading
1 Comment

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Software Business Business Computing Google Miscellaneous Workplace Tips Windows 10 Innovation Computer Backup Efficiency Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing IT Support Communication User Tips Business Management VoIP Smartphone Server Network Email Data Quick Tips Holiday Virtualization Remote Computing Operating System Social Media Going Green Upgrade Business Continuity Mobile Device Management Office Saving Money Disaster Recovery Apps Alert Save Money Chrome Small Business Android WiFi Identity Theft The Internet of Things Antivirus Application Big Data Managed Service Provider Microsoft Office Best Practice Mobility Social Employer-Employee Relationship Ransomware Facebook Information Technology Saving Time Spam Bandwidth Lithium-ion battery Law Enforcement Unified Threat Management Printer Hacking Office Tips Tablet Password Passwords BYOD Analytics History Search Gmail Browser Current Events Government Work/Life Balance Avoiding Downtime Maintenance Phone System Hard Drives Router Fraud Apple Money Data Management Gadgets Smartphones Users USB communications Encryption Telephone Systems Humor Remote Monitoring Tech Support Streaming Media Wireless Recovery Education intranet Firewall Net Neutrality User Error iPhone Network Security Automation Collaboration Laptop Computers Disaster Retail Proactive IT BDR Private Cloud Entertainment Managing Stress Wireless Technology Online Currency Wi-Fi Mobile Office Update Flexibility Budget IT Solutions Transportation Shortcut Business Intelligence Internet Exlporer Office 365 VPN Biometrics Social Engineering Outlook Customer Service Printer Server Telephony Virtual Reality App Google Drive Marketing DDoS Administration Personal Information Benefits IT Consultant Fax Server Content Filtering Data Loss Point of Sale PowerPoint Cybercrime Managed IT Services Cost Management Risk Management Wearable Technology Storage Save Time Television Files Video Games Two-factor Authentication OneDrive Bluetooth Bring Your Own Device Display Hacker Trending Paperless Office Chromecast Legal Customer Relationship Management Workplace SharePoint User Excel Keyboard Miscelllaneous Administrator Reputation Politics Teamwork Best Available Hiring/Firing HIPAA Access Travel Scalability Presentation Website RAM Regulations Experience Meetings Science ISP Ebay Hosted Solution How To 3D Printing Blogging CPU End of Support Music Running Cable Amazon Phishing Robot Networking Slow Advertising Cameras Books Smart Phones Data Theft Data storage Black Market Human Resources Near Field Communication Windows 8 PDF Electronic Medical Records Uninterrupted Power Supply CloudSync HaaS Instant Messaging Computer Accessories Vendor Management Text Messaging Safety Internet of Things Compliance Bloatware Programming Applications Battery IT consulting Computing Mouse Artificial Intelligence Emergency Distributed Denial of Service Sports Inbound Marketing Touchpad Emails Automobile Branding Audit Prodcuctivity Network Congestion Cleaning eWaste Twitter OneNote Online Backup Operating Sysytem Worker Commute WIndows 7

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code