Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Lessons From a Company that Successfully Beat Ransomware

Lessons From a Company that Successfully Beat Ransomware

Ransomware is a dangerous malware that all businesses fear. Although, if the right precautions are taken, a ransomware attack can be completely thwarted. A recent hack attack of the San Francisco Municipal Transportation Agency provides us with a real-world example of this, which helps make ransomware appear a lot less formidable.

Continue reading
0 Comments

Honor Among Hackers? Not for Those Who Hack Hospitals

Honor Among Hackers? Not for Those Who Hack Hospitals

It’s safe to say that hacking is a frowned-upon practice, but that hasn’t stopped cyber criminals from attempting to turn a profit off of it. This practice has led them to target nonconventional organizations, including hospitals and other healthcare facilities. However, just because a hacker can target a hospital, does this mean that they should? This is a topic of some debate amongst hackers, whom, believe it or not, actually do have some sort of ethical standards.

Continue reading
0 Comments

What is the 10,000 Hour Rule, and Does it Work?

What is the 10,000 Hour Rule, and Does it Work?

A business owner is always looking to improve their skills and learn about new ones. It’s natural to want to learn new things, even if you’re already an expert in your own field. The 10,000 hour rule offers a few guidelines to help you learn a new craft, but it’s not as easy as consistent practice. You might be in for a long journey toward “expert status.”

Continue reading
0 Comments

Don’t Let Hollywood Fool You Into Thinking Hackers are the Good Guys

Don’t Let Hollywood Fool You Into Thinking Hackers are the Good Guys

There’s no question about it; hackers make things difficult for businesses of all industries and sizes. They go out of their way to steal data and turn a profit off of it, as well as misrepresent organizations and individuals. The business environment is chaotic enough without hackers mucking everything up. However, the recent hacking attacks behind the group Anonymous have evolved the persona of the typical hacker into something very different.

Continue reading
0 Comments

FBI Director Insists Government Can Access Any Private Record

FBI Director Insists Government Can Access Any Private Record

Does the U.S. Constitution allow the American government to access the electronic devices of its citizens? According to FBI Director James Comey’s statements at Symantec’s Annual Government Symposium, it certainly does.

Continue reading
0 Comments

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Business Software Business Computing Google Windows 10 Miscellaneous Workplace Tips Innovation Computer Backup Efficiency Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing IT Support User Tips Communication Business Management VoIP Server Network Data Quick Tips Smartphone Virtualization Email Holiday Going Green Save Money Business Continuity Remote Computing Mobile Device Management Operating System Saving Money Social Media Upgrade Apps Disaster Recovery Alert Office Android Small Business Chrome Facebook Identity Theft Antivirus Mobility Application The Internet of Things Big Data Best Practice Managed Service Provider Microsoft Office Employer-Employee Relationship Ransomware Social WiFi Browser Lithium-ion battery Current Events Government Printer Information Technology BYOD Spam Law Enforcement Bandwidth Office Tips Unified Threat Management Password Hacking Tablet Passwords Analytics History Saving Time Search Gmail Recovery Network Security Streaming Media Hard Drives Maintenance Automation Education Fraud User Error Computers Disaster Avoiding Downtime Phone System Router Encryption Wireless Data Management Money Apple Remote Monitoring Tech Support Gadgets communications Smartphones Work/Life Balance intranet USB Net Neutrality Telephone Systems Firewall Users iPhone Collaboration Laptop Humor Marketing Administration Online Currency Content Filtering Cybercrime Risk Management Office 365 Point of Sale PowerPoint Cost Management Managing Stress Private Cloud Wireless Technology Retail BDR Entertainment Update VPN Personal Information Mobile Office Budget App Business Intelligence Transportation Shortcut Managed IT Services Internet Exlporer IT Solutions Biometrics Social Engineering Telephony IT Consultant Customer Service Fax Server Data Loss Wi-Fi Outlook Virtual Reality Google Drive Printer Server Wearable Technology DDoS Flexibility Proactive IT Benefits Artificial Intelligence Distributed Denial of Service Scalability Mouse Sports Experience Display Programming Branding Compliance Touchpad eWaste How To Network Congestion Music WIndows 7 Inbound Marketing Operating Sysytem Emails Audit Television Storage Files Books Two-factor Authentication OneNote Bluetooth Twitter Trending Black Market Website RAM Chromecast Electronic Medical Records Ebay Customer Relationship Management OneDrive SharePoint HaaS User Bring Your Own Device Amazon Instant Messaging Blogging Excel CPU Paperless Office Administrator Safety Workplace Teamwork Best Available Reputation Smart Phones Battery Slow Presentation Miscelllaneous Access Emergency Meetings Hosted Solution Automobile Windows 8 Science HIPAA Cleaning Running Cable Phishing Travel End of Support Regulations Worker Commute Vendor Management Robot Save Time ISP Networking Video Games 3D Printing Advertising Computing Near Field Communication Data storage Hacker Human Resources PDF Legal Cameras Prodcuctivity Uninterrupted Power Supply Data Theft Keyboard Text Messaging Computer Accessories Online Backup Internet of Things Politics Bloatware IT consulting CloudSync Applications Hiring/Firing

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code