Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Can Computer Data Be Stolen Through Power Lines?

Can Computer Data Be Stolen Through Power Lines?

If you have an air-gapped computer, you probably think you're safe.  You may think that barring physical access to the machine, no hacker could possibly steal the data on that machine.  Unfortunately, you'd be incorrect.

Continue reading

Lessons From a Company that Successfully Beat Ransomware

Lessons From a Company that Successfully Beat Ransomware

Ransomware is a dangerous malware that all businesses fear. Although, if the right precautions are taken, a ransomware attack can be completely thwarted. A recent hack attack of the San Francisco Municipal Transportation Agency provides us with a real-world example of this, which helps make ransomware appear a lot less formidable.

Continue reading
0 Comments

Tip of the Week: 4 Ways to Attract Top Talent to Your Company

Tip of the Week: 4 Ways to Attract Top Talent to Your Company

The ultimate goal of any business is to increase the volume of services it provides its clients in order to reap larger profits, as is likely the goal of your business as well. Perhaps you have been successful in attracting new clients, but if you wish to continue to experience such growth, then you’ll need to also attract quality employees.

Continue reading
0 Comments

These 2 Keystrokes are All that’s Needed to Access Windows 10

These 2 Keystrokes are All that’s Needed to Access Windows 10

When someone asks you to troubleshoot a problem, it’s because there is something that is preventing their solutions from working properly, which they need them to do. In business, this happens all the time. This is why every business provides some semblance of support with their product or service. What happens, however, when the act of troubleshooting makes something worse. One security analyst came across this problem in an unlikely place: Microsoft’s newest desktop operating systems, Windows 10.

Continue reading
0 Comments

Why Heart Attack Victims Should Be Wary of Hacking Attacks

Why Heart Attack Victims Should Be Wary of Hacking Attacks

It goes without saying that having to rely on a pacemaker isn’t an ideal circumstance for anyone, even considering that the device allows the patient to continue living a fulfilling life. This is why a particular discovery of a European-based research team becomes a shade or two darker: the team has concluded that it’s possible for a novice to send life-threatening signals to the device.

Continue reading
0 Comments

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Business Software Business Computing Google Miscellaneous Workplace Tips Windows 10 Backup Efficiency Innovation Computer Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing User Tips Communication IT Support Business Management VoIP Server Network Data Quick Tips Smartphone Virtualization Email Holiday Going Green Business Continuity Save Money Mobile Device Management Remote Computing Saving Money Operating System Social Media Upgrade Apps Disaster Recovery Alert Office Android Small Business Chrome Facebook Antivirus Application Best Practice Employer-Employee Relationship Mobility The Internet of Things Ransomware Big Data Managed Service Provider Microsoft Office WiFi Social Identity Theft Lithium-ion battery Law Enforcement Browser Printer Office Tips Current Events Government Password BYOD Information Technology Spam Bandwidth Unified Threat Management Hacking Tablet Passwords Saving Time Analytics History Search Gmail Work/Life Balance Hard Drives Maintenance Streaming Media Fraud Education Money Data Management User Error Disaster Computers communications Encryption Avoiding Downtime Phone System Telephone Systems Router Apple Humor Remote Monitoring Tech Support Gadgets intranet Recovery Smartphones Net Neutrality Firewall Wireless Network Security iPhone USB Collaboration Laptop Users Automation Online Currency Marketing Administration Update Wi-Fi Content Filtering Flexibility Budget Point of Sale PowerPoint Cost Management Shortcut Business Intelligence Transportation Retail BDR Internet Exlporer VPN Biometrics Entertainment Social Engineering Office 365 Telephony Customer Service Mobile Office App Virtual Reality Google Drive DDoS Benefits IT Solutions Personal Information Fax Server IT Consultant Data Loss Cybercrime Risk Management Wearable Technology Outlook Managed IT Services Printer Server Proactive IT Private Cloud Managing Stress Wireless Technology Customer Relationship Management Chromecast SharePoint User Hacker Legal Compliance Excel Programming Administrator Reputation Teamwork Best Available Keyboard Inbound Marketing Audit Presentation Politics Access Emails RAM Meetings Hiring/Firing Website Ebay Scalability Hosted Solution Twitter Science OneNote Experience CPU End of Support Running Cable Amazon Phishing Blogging How To OneDrive Networking Bring Your Own Device Music Robot Slow Advertising Paperless Office Smart Phones Workplace Human Resources Near Field Communication Books Data storage PDF Miscelllaneous Windows 8 Black Market Uninterrupted Power Supply Electronic Medical Records HaaS Text Messaging HIPAA Computer Accessories Vendor Management Instant Messaging Internet of Things Travel Bloatware Regulations IT consulting Safety Applications Artificial Intelligence Distributed Denial of Service Computing Mouse ISP 3D Printing Battery Sports Branding Emergency Touchpad eWaste Prodcuctivity Network Congestion Automobile Operating Sysytem Cameras WIndows 7 Cleaning Online Backup Television Data Theft Storage Two-factor Authentication Worker Commute Files Bluetooth Save Time Display Video Games Trending CloudSync

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code