Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Lessons From a Company that Successfully Beat Ransomware

Lessons From a Company that Successfully Beat Ransomware

Ransomware is a dangerous malware that all businesses fear. Although, if the right precautions are taken, a ransomware attack can be completely thwarted. A recent hack attack of the San Francisco Municipal Transportation Agency provides us with a real-world example of this, which helps make ransomware appear a lot less formidable.

Continue reading
0 Comments

Honor Among Hackers? Not for Those Who Hack Hospitals

Honor Among Hackers? Not for Those Who Hack Hospitals

It’s safe to say that hacking is a frowned-upon practice, but that hasn’t stopped cyber criminals from attempting to turn a profit off of it. This practice has led them to target nonconventional organizations, including hospitals and other healthcare facilities. However, just because a hacker can target a hospital, does this mean that they should? This is a topic of some debate amongst hackers, whom, believe it or not, actually do have some sort of ethical standards.

Continue reading
0 Comments

What is the 10,000 Hour Rule, and Does it Work?

What is the 10,000 Hour Rule, and Does it Work?

A business owner is always looking to improve their skills and learn about new ones. It’s natural to want to learn new things, even if you’re already an expert in your own field. The 10,000 hour rule offers a few guidelines to help you learn a new craft, but it’s not as easy as consistent practice. You might be in for a long journey toward “expert status.”

Continue reading
0 Comments

Don’t Let Hollywood Fool You Into Thinking Hackers are the Good Guys

Don’t Let Hollywood Fool You Into Thinking Hackers are the Good Guys

There’s no question about it; hackers make things difficult for businesses of all industries and sizes. They go out of their way to steal data and turn a profit off of it, as well as misrepresent organizations and individuals. The business environment is chaotic enough without hackers mucking everything up. However, the recent hacking attacks behind the group Anonymous have evolved the persona of the typical hacker into something very different.

Continue reading
0 Comments

FBI Director Insists Government Can Access Any Private Record

FBI Director Insists Government Can Access Any Private Record

Does the U.S. Constitution allow the American government to access the electronic devices of its citizens? According to FBI Director James Comey’s statements at Symantec’s Annual Government Symposium, it certainly does.

Continue reading
0 Comments

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Software Business Business Computing Google Miscellaneous Windows 10 Workplace Tips Innovation Computer Backup Efficiency Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing IT Support Communication User Tips Business Management VoIP Server Smartphone Network Email Data Holiday Quick Tips Virtualization Remote Computing Operating System Going Green Social Media Upgrade Business Continuity Mobile Device Management Office Saving Money Apps Disaster Recovery Alert Save Money Chrome Small Business Android Identity Theft Ransomware The Internet of Things Antivirus Big Data Managed Service Provider Microsoft Office Mobility Social Application Facebook Best Practice Employer-Employee Relationship WiFi Bandwidth Lithium-ion battery Unified Threat Management Printer Hacking Tablet BYOD Passwords Law Enforcement History Office Tips Analytics Search Gmail Password Browser Current Events Government Saving Time Information Technology Spam Humor Avoiding Downtime Hard Drives Maintenance Phone System Router Recovery Fraud Apple Network Security Automation Gadgets Smartphones Users USB Encryption Remote Monitoring Wireless Data Management Tech Support Money Streaming Media intranet Education Net Neutrality Firewall iPhone communications User Error Collaboration Work/Life Balance Laptop Disaster Computers Telephone Systems Google Drive Entertainment DDoS Flexibility Online Currency Mobile Office Benefits Cybercrime IT Solutions Risk Management Office 365 Managing Stress Private Cloud Wireless Technology VPN Outlook Update Printer Server Personal Information App Marketing Budget Administration Business Intelligence Transportation Shortcut IT Consultant Managed IT Services Fax Server Content Filtering Internet Exlporer Data Loss Biometrics Point of Sale PowerPoint Social Engineering Cost Management Telephony Customer Service Wearable Technology Retail BDR Proactive IT Wi-Fi Virtual Reality Bring Your Own Device Keyboard Display Paperless Office Computer Accessories Text Messaging Internet of Things Politics Bloatware Workplace IT consulting Applications Hiring/Firing Distributed Denial of Service Scalability Miscelllaneous Mouse Artificial Intelligence Sports Experience Touchpad Branding eWaste How To HIPAA Network Congestion Music Travel RAM WIndows 7 Operating Sysytem Website Regulations Ebay Television Storage ISP 3D Printing Files Books Two-factor Authentication CPU Amazon Blogging Bluetooth Trending Black Market Chromecast Electronic Medical Records Customer Relationship Management HaaS Slow User Smart Phones Cameras SharePoint Instant Messaging Data Theft Excel Administrator Safety Teamwork Best Available Reputation Windows 8 Battery CloudSync Presentation Access Emergency Meetings Vendor Management Hosted Solution Automobile Compliance Science Programming Cleaning Running Cable Phishing Computing End of Support Worker Commute Inbound Marketing Audit Robot Save Time Emails Networking Video Games Prodcuctivity Advertising Twitter OneNote Online Backup Near Field Communication Data storage Hacker Human Resources Legal PDF Uninterrupted Power Supply OneDrive

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code