Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why You Should Read the Fine Print Before Downloading Adware

Why You Should Read the Fine Print Before Downloading Adware

Has this ever happened to you? You come across a free app online that seems interesting, entertaining, or helpful so you decide to download it? However, as soon as you click the download button you regret it as it begins to install browser toolbars, adware, and other annoying (and potentially dangerous) software onto your device? How can you keep this “crapware” from getting too out of hand, and why is it so popular in the first place?

Continue reading
0 Comments

3 Common Threats You Need to Know About: Malware, Rootkits, and Trojans

3 Common Threats You Need to Know About: Malware, Rootkits, and Trojans

Security is one of the most important parts of running a business, especially today when organizations rely so heavily on their technology solutions. Some of the most dangerous threats lurk on a business’s network, watching and waiting for an opportunity to do some real damage. With the right preventative measures, your business can catch these threats in the act before they can accomplish their goals.

Continue reading
0 Comments

Advanced Malware is Targeted, Stealthy, Evasive, and Adaptive

b2ap3_thumbnail_advanced_malware_presents_threats_400.jpgThe online world is a scary place. Viruses, malware, spyware, adware, and more are all out there trying to get at your network. These threats are almost always prevalent, but compared to each other, some are vastly superior and far more dangerous and advanced than the others. Advanced malware has the potential to disrupt your business’s operations, cause extensive data loss, and more.

Continue reading
0 Comments

Unified Threat Management: Ultimate Protection for a New Era

b2ap3_thumbnail_data_and_network_security_400.jpgEverything changes in due time. Computers grow less secure, malware grows more sophisticated, and hackers' methods change. According to Processor magazine, 80 to 90 percent of attacks are targeted at devices rather than networks and servers. Just like the weakest link in a fence, all it takes is one weak point for a hacker to take down your entire network.

Continue reading
0 Comments

Symantec Declares Antivirus “is dead”

 
b2ap3_thumbnail_antivirus_400.jpg
Some 25 years ago, Symantec, invented commercial antivirus software to protect computers from hackers.  Now they are telling us that such tactics are doomed to failure.  According to Symantec’s senior vice president, Brian Dye, antivirus “is dead”.  “We don’t think of antivirus as a moneymaker in any way.”  That’s a bold statement given the thousands of customers that shell out $50 or more per year for their Norton AntiVirus product.
Continue reading
0 Comments

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Microsoft Productivity Hackers Malware Software Business Computing Google Business Windows 10 Miscellaneous Workplace Tips Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware Mobile Devices Mobile Computing IT Services Health User Tips Communication IT Support VoIP Business Management Network Data Quick Tips Smartphone Email Virtualization Holiday Server Remote Computing Business Continuity Mobile Device Management Operating System Saving Money Social Media Upgrade Disaster Recovery Office Apps Alert Going Green Save Money Chrome Small Business Android Ransomware The Internet of Things Big Data Managed Service Provider Mobility Microsoft Office Social Application WiFi Facebook Identity Theft Best Practice Antivirus Employer-Employee Relationship Bandwidth BYOD Unified Threat Management Hacking Tablet Passwords Law Enforcement Analytics History Office Tips Search Gmail Password Saving Time Browser Current Events Government Lithium-ion battery Printer Information Technology Spam Humor Avoiding Downtime Phone System Router Recovery Apple Encryption Network Security Automation Remote Monitoring Tech Support Gadgets Smartphones USB Users intranet Firewall Net Neutrality iPhone Collaboration Laptop Wireless Data Management Money Streaming Media Maintenance Hard Drives Education communications User Error Fraud Work/Life Balance Disaster Computers Telephone Systems Google Drive Entertainment DDoS Flexibility Mobile Office Benefits VPN Cybercrime Risk Management IT Solutions App Office 365 Managing Stress Private Cloud Wireless Technology IT Consultant Fax Server Outlook Data Loss Update Printer Server Personal Information Wearable Technology Marketing Budget Administration Proactive IT Business Intelligence Transportation Shortcut Managed IT Services Content Filtering Online Currency Internet Exlporer Biometrics Point of Sale PowerPoint Social Engineering Cost Management Telephony Customer Service Retail BDR Wi-Fi Virtual Reality Bring Your Own Device Ebay Keyboard Paperless Office Computer Accessories Text Messaging Blogging CPU Internet of Things Politics Bloatware Amazon Workplace IT consulting Applications Hiring/Firing Distributed Denial of Service Scalability Miscelllaneous Mouse Artificial Intelligence Slow Sports Experience Smart Phones Touchpad Branding eWaste How To HIPAA Network Congestion Windows 8 Music Travel Regulations WIndows 7 Operating Sysytem Television Storage ISP Vendor Management 3D Printing Files Books Two-factor Authentication Bluetooth Trending Black Market Computing Chromecast Electronic Medical Records Customer Relationship Management Cameras SharePoint HaaS User Instant Messaging Data Theft Excel Prodcuctivity Administrator Safety Teamwork Best Available Reputation Online Backup Battery CloudSync Presentation Access Emergency Meetings Hosted Solution Automobile Compliance Science Programming Display Cleaning Running Cable Phishing End of Support Worker Commute Inbound Marketing Audit Robot Save Time Emails Networking Video Games Advertising Twitter OneNote Near Field Communication Data storage Hacker Human Resources Legal PDF Website RAM Uninterrupted Power Supply OneDrive

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code