Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why You Should Read the Fine Print Before Downloading Adware

Why You Should Read the Fine Print Before Downloading Adware

Has this ever happened to you? You come across a free app online that seems interesting, entertaining, or helpful so you decide to download it? However, as soon as you click the download button you regret it as it begins to install browser toolbars, adware, and other annoying (and potentially dangerous) software onto your device? How can you keep this “crapware” from getting too out of hand, and why is it so popular in the first place?

Continue reading
0 Comments

3 Common Threats You Need to Know About: Malware, Rootkits, and Trojans

3 Common Threats You Need to Know About: Malware, Rootkits, and Trojans

Security is one of the most important parts of running a business, especially today when organizations rely so heavily on their technology solutions. Some of the most dangerous threats lurk on a business’s network, watching and waiting for an opportunity to do some real damage. With the right preventative measures, your business can catch these threats in the act before they can accomplish their goals.

Continue reading
0 Comments

Advanced Malware is Targeted, Stealthy, Evasive, and Adaptive

b2ap3_thumbnail_advanced_malware_presents_threats_400.jpgThe online world is a scary place. Viruses, malware, spyware, adware, and more are all out there trying to get at your network. These threats are almost always prevalent, but compared to each other, some are vastly superior and far more dangerous and advanced than the others. Advanced malware has the potential to disrupt your business’s operations, cause extensive data loss, and more.

Continue reading
0 Comments

Unified Threat Management: Ultimate Protection for a New Era

b2ap3_thumbnail_data_and_network_security_400.jpgEverything changes in due time. Computers grow less secure, malware grows more sophisticated, and hackers' methods change. According to Processor magazine, 80 to 90 percent of attacks are targeted at devices rather than networks and servers. Just like the weakest link in a fence, all it takes is one weak point for a hacker to take down your entire network.

Continue reading
0 Comments

Symantec Declares Antivirus “is dead”

 
b2ap3_thumbnail_antivirus_400.jpg
Some 25 years ago, Symantec, invented commercial antivirus software to protect computers from hackers.  Now they are telling us that such tactics are doomed to failure.  According to Symantec’s senior vice president, Brian Dye, antivirus “is dead”.  “We don’t think of antivirus as a moneymaker in any way.”  That’s a bold statement given the thousands of customers that shell out $50 or more per year for their Norton AntiVirus product.
Continue reading
0 Comments

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Microsoft Productivity Hackers Malware Software Business Computing Google Business Miscellaneous Workplace Tips Windows 10 Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware Mobile Devices Mobile Computing IT Services Health User Tips Communication IT Support VoIP Business Management Data Quick Tips Smartphone Email Virtualization Holiday Server Network Mobile Device Management Operating System Saving Money Social Media Upgrade Disaster Recovery Apps Office Alert Going Green Save Money Remote Computing Business Continuity Chrome Small Business Android The Internet of Things Big Data Managed Service Provider Microsoft Office Application Social Best Practice WiFi Facebook Identity Theft Employer-Employee Relationship Mobility Ransomware Antivirus Unified Threat Management Hacking Tablet Law Enforcement Passwords Office Tips Password Analytics History Search Gmail Saving Time Browser Current Events Lithium-ion battery Government Printer Information Technology Spam BYOD Bandwidth Avoiding Downtime Automation Phone System Wireless Router Encryption Apple Work/Life Balance Remote Monitoring Gadgets Tech Support Smartphones Users USB Data Management intranet Money Net Neutrality Firewall iPhone Collaboration Laptop communications Streaming Media Telephone Systems Maintenance Education Hard Drives Humor User Error Fraud Computers Disaster Recovery Network Security Cybercrime Mobile Office Risk Management VPN Managing Stress Private Cloud Managed IT Services Wireless Technology App IT Solutions Update Wi-Fi IT Consultant Fax Server Budget Outlook Flexibility Printer Server Data Loss Business Intelligence Transportation Shortcut Internet Exlporer Wearable Technology Biometrics Marketing Social Engineering Proactive IT Administration Telephony Customer Service Office 365 Online Currency Content Filtering Virtual Reality Google Drive Point of Sale DDoS PowerPoint Cost Management Benefits Retail BDR Entertainment Personal Information Blogging Workplace CPU Emergency Amazon WIndows 7 Operating Sysytem Automobile Television Storage Miscelllaneous Slow Cleaning Files Two-factor Authentication Smart Phones Bluetooth Worker Commute Trending HIPAA Travel Windows 8 Save Time Chromecast Customer Relationship Management User Regulations Video Games SharePoint ISP Excel Vendor Management Hacker Administrator 3D Printing Teamwork Best Available Reputation Legal Presentation Keyboard Access Computing Meetings Cameras Politics Hosted Solution Science Data Theft Hiring/Firing Prodcuctivity Scalability Running Cable Phishing End of Support Online Backup Experience CloudSync Robot Networking How To Advertising Programming Music Compliance Near Field Communication Display Data storage Human Resources PDF Books Uninterrupted Power Supply Inbound Marketing Emails Audit Black Market Computer Accessories Text Messaging OneNote Electronic Medical Records Internet of Things Bloatware Twitter IT consulting Applications HaaS Instant Messaging Distributed Denial of Service Mouse Artificial Intelligence Website OneDrive RAM Safety Sports Ebay Bring Your Own Device Touchpad Branding Battery eWaste Network Congestion Paperless Office

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code