Contact us today!
(469) 567-0181
(903) 458-9400
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Lessons From a Company that Successfully Beat Ransomware

Lessons From a Company that Successfully Beat Ransomware

Ransomware is a dangerous malware that all businesses fear. Although, if the right precautions are taken, a ransomware attack can be completely thwarted. A recent hack attack of the San Francisco Municipal Transportation Agency provides us with a real-world example of this, which helps make ransomware appear a lot less formidable.

Continue reading
0 Comments

Honor Among Hackers? Not for Those Who Hack Hospitals

Honor Among Hackers? Not for Those Who Hack Hospitals

It’s safe to say that hacking is a frowned-upon practice, but that hasn’t stopped cyber criminals from attempting to turn a profit off of it. This practice has led them to target nonconventional organizations, including hospitals and other healthcare facilities. However, just because a hacker can target a hospital, does this mean that they should? This is a topic of some debate amongst hackers, whom, believe it or not, actually do have some sort of ethical standards.

Continue reading
0 Comments

What is the 10,000 Hour Rule, and Does it Work?

What is the 10,000 Hour Rule, and Does it Work?

A business owner is always looking to improve their skills and learn about new ones. It’s natural to want to learn new things, even if you’re already an expert in your own field. The 10,000 hour rule offers a few guidelines to help you learn a new craft, but it’s not as easy as consistent practice. You might be in for a long journey toward “expert status.”

Continue reading
0 Comments

Don’t Let Hollywood Fool You Into Thinking Hackers are the Good Guys

Don’t Let Hollywood Fool You Into Thinking Hackers are the Good Guys

There’s no question about it; hackers make things difficult for businesses of all industries and sizes. They go out of their way to steal data and turn a profit off of it, as well as misrepresent organizations and individuals. The business environment is chaotic enough without hackers mucking everything up. However, the recent hacking attacks behind the group Anonymous have evolved the persona of the typical hacker into something very different.

Continue reading
0 Comments

FBI Director Insists Government Can Access Any Private Record

FBI Director Insists Government Can Access Any Private Record

Does the U.S. Constitution allow the American government to access the electronic devices of its citizens? According to FBI Director James Comey’s statements at Symantec’s Annual Government Symposium, it certainly does.

Continue reading
0 Comments

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Business Software Business Computing Google Miscellaneous Workplace Tips Windows 10 Backup Efficiency Innovation Computer Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing User Tips IT Support Communication Business Management VoIP Holiday Server Network Data Quick Tips Virtualization Smartphone Email Going Green Business Continuity Mobile Device Management Saving Money Save Money Remote Computing Disaster Recovery Apps Operating System Alert Social Media Upgrade Office Android Small Business Chrome Social Antivirus Facebook Application Mobility Best Practice Employer-Employee Relationship Ransomware The Internet of Things Big Data WiFi Managed Service Provider Identity Theft Microsoft Office Lithium-ion battery Printer Analytics History Search Gmail Law Enforcement Office Tips Browser Current Events BYOD Password Government Information Technology Spam Bandwidth Unified Threat Management Hacking Tablet Saving Time Passwords Users USB Maintenance Hard Drives Fraud Streaming Media Education Money Data Management User Error Encryption Computers Disaster communications Remote Monitoring Tech Support Wireless Avoiding Downtime Telephone Systems Phone System Router Humor intranet Firewall Apple Net Neutrality iPhone Collaboration Laptop Work/Life Balance Recovery Gadgets Network Security Automation Smartphones Online Currency Outlook Printer Server Private Cloud Managing Stress Wireless Technology Marketing Update Administration Office 365 Budget Content Filtering VPN Point of Sale Transportation Shortcut Business Intelligence PowerPoint Cost Management Internet Exlporer Personal Information Biometrics Retail BDR App Social Engineering Telephony Customer Service Entertainment Virtual Reality Mobile Office IT Consultant Google Drive Fax Server Managed IT Services DDoS Data Loss Benefits Wearable Technology IT Solutions Proactive IT Wi-Fi Cybercrime Risk Management Flexibility Politics Storage Television Files Hiring/Firing Two-factor Authentication Cameras Bluetooth Scalability Data Theft Experience Trending Chromecast Customer Relationship Management SharePoint How To User CloudSync Music Excel Website Administrator RAM Compliance Programming Ebay Reputation Teamwork Best Available Books Blogging Access CPU Presentation Amazon Inbound Marketing Meetings Black Market Electronic Medical Records Science Emails Audit Hosted Solution Slow HaaS Smart Phones Twitter OneNote End of Support Running Cable Instant Messaging Phishing Safety Windows 8 Robot Networking OneDrive Advertising Battery Emergency Bring Your Own Device Vendor Management Data storage Human Resources Near Field Communication Paperless Office Workplace PDF Automobile Uninterrupted Power Supply Cleaning Computing Miscelllaneous Computer Accessories Text Messaging Worker Commute Internet of Things Save Time Bloatware Prodcuctivity Applications Video Games IT consulting HIPAA Mouse Travel Artificial Intelligence Distributed Denial of Service Sports Hacker Online Backup Regulations ISP Touchpad Branding Legal Network Congestion 3D Printing eWaste Keyboard Display Operating Sysytem WIndows 7

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code