Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Can Computer Data Be Stolen Through Power Lines?

Can Computer Data Be Stolen Through Power Lines?

If you have an air-gapped computer, you probably think you're safe.  You may think that barring physical access to the machine, no hacker could possibly steal the data on that machine.  Unfortunately, you'd be incorrect.

Continue reading

These 2 Keystrokes are All that’s Needed to Access Windows 10

These 2 Keystrokes are All that’s Needed to Access Windows 10

When someone asks you to troubleshoot a problem, it’s because there is something that is preventing their solutions from working properly, which they need them to do. In business, this happens all the time. This is why every business provides some semblance of support with their product or service. What happens, however, when the act of troubleshooting makes something worse. One security analyst came across this problem in an unlikely place: Microsoft’s newest desktop operating systems, Windows 10.

Continue reading
0 Comments

Why Heart Attack Victims Should Be Wary of Hacking Attacks

Why Heart Attack Victims Should Be Wary of Hacking Attacks

It goes without saying that having to rely on a pacemaker isn’t an ideal circumstance for anyone, even considering that the device allows the patient to continue living a fulfilling life. This is why a particular discovery of a European-based research team becomes a shade or two darker: the team has concluded that it’s possible for a novice to send life-threatening signals to the device.

Continue reading
0 Comments

Passwords Are on the Way Out. What’s Next?

Passwords Are on the Way Out. What’s Next?

Passwords are a critical security component of any online account. In many cases, they’re the fine line of defense against the horde of threats that exist on the Internet. The problem that many users have with passwords, however, is that good passwords are difficult to remember, and on their own, aren’t necessarily the most secure option. So, how can you make passwords both easier to use and more secure?

Continue reading
0 Comments

Why Small Businesses Need to Think Big When it Comes to Network Security

Why Small Businesses Need to Think Big When it Comes to Network Security

There are benefits to being a small business. Being small provides all sorts of flexibility, including the ability to make decisions quickly and without having to go through so many hoops. Plus, you have a smaller workforce, which makes for a more personal experience. However, this also leads to a rather unfortunate side-effect of believing that you’re immune to being hacked.

Continue reading
0 Comments

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Software Business Business Computing Google Miscellaneous Workplace Tips Windows 10 Innovation Computer Backup Efficiency Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing IT Support Communication User Tips Business Management VoIP Server Smartphone Network Email Data Quick Tips Holiday Virtualization Remote Computing Operating System Social Media Going Green Upgrade Business Continuity Office Mobile Device Management Saving Money Disaster Recovery Apps Alert Save Money Chrome Small Business Android WiFi Identity Theft The Internet of Things Antivirus Application Big Data Managed Service Provider Microsoft Office Best Practice Social Employer-Employee Relationship Facebook Ransomware Mobility Saving Time Information Technology Spam Bandwidth Lithium-ion battery Unified Threat Management Law Enforcement Printer Hacking Office Tips Tablet Password Passwords BYOD Analytics History Search Gmail Browser Current Events Government Avoiding Downtime Hard Drives Phone System Maintenance Router Wireless Apple Fraud Data Management Money Gadgets Smartphones Work/Life Balance Users USB communications Encryption Telephone Systems Humor Remote Monitoring Tech Support Streaming Media Education Recovery intranet Net Neutrality Firewall iPhone Network Security User Error Laptop Automation Collaboration Computers Disaster Retail BDR Proactive IT Managing Stress Entertainment Private Cloud Wireless Technology Personal Information Online Currency Mobile Office Update Managed IT Services Budget IT Solutions Transportation Shortcut Business Intelligence Internet Exlporer VPN Biometrics Social Engineering Wi-Fi Outlook Printer Server Telephony Customer Service Flexibility Virtual Reality App Marketing Google Drive DDoS Administration Benefits IT Consultant Content Filtering Fax Server Office 365 Data Loss Point of Sale PowerPoint Cybercrime Cost Management Wearable Technology Risk Management Television Storage Electronic Medical Records HaaS OneDrive Files Two-factor Authentication Instant Messaging Bring Your Own Device Bluetooth Trending Display Safety Paperless Office Workplace Chromecast Customer Relationship Management User Battery SharePoint Excel Emergency Miscelllaneous Administrator Best Available Automobile Reputation Teamwork Cleaning HIPAA Travel Access Presentation Regulations Website Worker Commute RAM Meetings ISP Hosted Solution Science Ebay Save Time Video Games 3D Printing Amazon Phishing Blogging CPU End of Support Running Cable Hacker Legal Robot Networking Smart Phones Cameras Slow Advertising Keyboard Data Theft Data storage Human Resources Near Field Communication Windows 8 Politics PDF Uninterrupted Power Supply Hiring/Firing CloudSync Scalability Computer Accessories Vendor Management Experience Text Messaging Programming Internet of Things Bloatware Compliance IT consulting How To Applications Distributed Denial of Service Computing Mouse Music Artificial Intelligence Sports Inbound Marketing Emails Audit Touchpad Branding eWaste Prodcuctivity Network Congestion Books OneNote Twitter WIndows 7 Black Market Online Backup Operating Sysytem

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code