Contact us today!
(469) 567-0181
(903) 458-9400
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why You Should Read the Fine Print Before Downloading Adware

Why You Should Read the Fine Print Before Downloading Adware

Has this ever happened to you? You come across a free app online that seems interesting, entertaining, or helpful so you decide to download it? However, as soon as you click the download button you regret it as it begins to install browser toolbars, adware, and other annoying (and potentially dangerous) software onto your device? How can you keep this “crapware” from getting too out of hand, and why is it so popular in the first place?

Continue reading
0 Comments

3 Common Threats You Need to Know About: Malware, Rootkits, and Trojans

3 Common Threats You Need to Know About: Malware, Rootkits, and Trojans

Security is one of the most important parts of running a business, especially today when organizations rely so heavily on their technology solutions. Some of the most dangerous threats lurk on a business’s network, watching and waiting for an opportunity to do some real damage. With the right preventative measures, your business can catch these threats in the act before they can accomplish their goals.

Continue reading
0 Comments

Advanced Malware is Targeted, Stealthy, Evasive, and Adaptive

b2ap3_thumbnail_advanced_malware_presents_threats_400.jpgThe online world is a scary place. Viruses, malware, spyware, adware, and more are all out there trying to get at your network. These threats are almost always prevalent, but compared to each other, some are vastly superior and far more dangerous and advanced than the others. Advanced malware has the potential to disrupt your business’s operations, cause extensive data loss, and more.

Continue reading
0 Comments

Unified Threat Management: Ultimate Protection for a New Era

b2ap3_thumbnail_data_and_network_security_400.jpgEverything changes in due time. Computers grow less secure, malware grows more sophisticated, and hackers' methods change. According to Processor magazine, 80 to 90 percent of attacks are targeted at devices rather than networks and servers. Just like the weakest link in a fence, all it takes is one weak point for a hacker to take down your entire network.

Continue reading
0 Comments

Symantec Declares Antivirus “is dead”

 
b2ap3_thumbnail_antivirus_400.jpg
Some 25 years ago, Symantec, invented commercial antivirus software to protect computers from hackers.  Now they are telling us that such tactics are doomed to failure.  According to Symantec’s senior vice president, Brian Dye, antivirus “is dead”.  “We don’t think of antivirus as a moneymaker in any way.”  That’s a bold statement given the thousands of customers that shell out $50 or more per year for their Norton AntiVirus product.
Continue reading
0 Comments

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Business Software Business Computing Google Miscellaneous Windows 10 Workplace Tips Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing IT Support Communication User Tips Business Management VoIP Smartphone Email Server Holiday Network Data Quick Tips Virtualization Remote Computing Operating System Social Media Upgrade Office Going Green Business Continuity Mobile Device Management Saving Money Save Money Disaster Recovery Apps Alert Chrome Small Business Android Employer-Employee Relationship WiFi The Internet of Things Mobility Identity Theft Ransomware Big Data Managed Service Provider Microsoft Office Antivirus Social Facebook Application Best Practice Bandwidth Unified Threat Management Saving Time Hacking Tablet Lithium-ion battery Printer Passwords Analytics BYOD History Gmail Search Browser Law Enforcement Office Tips Current Events Government Password Information Technology Spam Net Neutrality Firewall iPhone communications Collaboration Laptop Avoiding Downtime Phone System Router Telephone Systems Apple Humor Hard Drives Maintenance Recovery Gadgets Fraud Smartphones Network Security Users Automation USB Wireless Encryption Work/Life Balance Streaming Media Education Remote Monitoring Data Management User Error Money Tech Support Computers Disaster intranet Data Loss Entertainment Biometrics Social Engineering Telephony Customer Service Mobile Office Wearable Technology Office 365 Virtual Reality Proactive IT Google Drive DDoS Online Currency IT Solutions Benefits Personal Information Cybercrime Outlook Risk Management Printer Server Managed IT Services Private Cloud Managing Stress Wireless Technology Marketing VPN Administration Update Content Filtering Wi-Fi App Budget Point of Sale PowerPoint Flexibility Cost Management Transportation Shortcut Business Intelligence Retail IT Consultant Fax Server Internet Exlporer BDR Robot Networking Bring Your Own Device Paperless Office How To Advertising Prodcuctivity Music Workplace Online Backup Data storage Human Resources Near Field Communication Miscelllaneous PDF Uninterrupted Power Supply Books HIPAA Computer Accessories Display Black Market Text Messaging Internet of Things Travel Bloatware Electronic Medical Records HaaS Applications Regulations IT consulting Mouse Instant Messaging ISP Artificial Intelligence Distributed Denial of Service Sports Safety 3D Printing Touchpad Branding Network Congestion Battery eWaste Emergency RAM Operating Sysytem Cameras WIndows 7 Website Data Theft Storage Ebay Automobile Television Files Two-factor Authentication Cleaning CPU Bluetooth Amazon Blogging Trending CloudSync Worker Commute Chromecast Customer Relationship Management Save Time User Video Games Slow SharePoint Smart Phones Compliance Excel Programming Administrator Hacker Best Available Windows 8 Legal Reputation Teamwork Inbound Marketing Access Emails Keyboard Audit Presentation Vendor Management Meetings Hosted Solution Twitter Science Politics OneNote Hiring/Firing Phishing Scalability End of Support Running Cable Computing Experience OneDrive

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code