Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

BYOD Privacy: When Two Phones are Better Than One

b2ap3_thumbnail_bring_your_own_device_400.jpgBring Your Own Device (BYOD) has been a hot IT trend for the past few years. Initially, everybody loved the idea of workers using their personal smartphone for work and organizations were quick to adopt BYOD. Now, after years of trying out the policy, companies and employees are having reservations about BYOD, making some even long for the days of Blackberry.

Continue reading

Old Devices Can Compromise Security

b2ap3_thumbnail_device_security_400.jpgAs a responsible business owner, you know that using the latest technology and running updated software is a key component to your company's network security. However, your employees may not value the latest tech like you do, which could result in a major data breach, despite your best efforts to keep your company current.

Continue reading

Old Mobile Devices Might Be Hurting Your Business’s Security

b2ap3_thumbnail_old_tech_security_risk_400.jpgOne of the greatest things about today's technology is that it has grown more mobile, and some employees like to bring their own devices from home to use for their workplace. This is called BYOD, and while it is useful sometimes, it might be putting your business at risk.

Continue reading

Is Your Business Ready for the Security Challenges of Wearable Tech?

b2ap3_thumbnail_wearable_security_400.jpgDue to the growing popularity of employees using their personal devices in the workplace (BYOD), many companies have created BYOD policies to handle the unique security threats brought about by these devices. Does the new trend of wearable technology mean that you need a separate WYOD policy?

Continue reading

Sign Up for Our Newsletter

Powered by ChronoForms -

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Software Business Business Computing Google Miscellaneous Workplace Tips Windows 10 Backup Efficiency Innovation Computer Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing Communication User Tips IT Support Business Management VoIP Smartphone Server Network Email Data Holiday Quick Tips Virtualization Operating System Going Green Social Media Upgrade Business Continuity Mobile Device Management Office Saving Money Apps Disaster Recovery Alert Save Money Remote Computing Chrome Small Business Android The Internet of Things Antivirus Application Big Data Managed Service Provider Microsoft Office Best Practice Mobility Social Employer-Employee Relationship Facebook Ransomware WiFi Identity Theft Lithium-ion battery Law Enforcement Unified Threat Management Printer Office Tips Hacking Tablet Password BYOD Passwords Analytics History Search Gmail Browser Current Events Government Saving Time Information Technology Spam Bandwidth Avoiding Downtime Phone System Hard Drives Maintenance Router Apple Fraud Money Data Management Gadgets Smartphones Users USB communications Encryption Telephone Systems Remote Monitoring Humor Tech Support Streaming Media intranet Education Recovery Wireless Net Neutrality Firewall Network Security iPhone User Error Collaboration Automation Laptop Computers Disaster Work/Life Balance Online Currency Wi-Fi Mobile Office Update Flexibility Budget IT Solutions Transportation Shortcut Business Intelligence Internet Exlporer Office 365 VPN Biometrics Outlook Social Engineering Printer Server Customer Service Telephony Virtual Reality App Marketing Google Drive Administration DDoS Personal Information Benefits Fax Server Content Filtering IT Consultant Point of Sale Data Loss PowerPoint Cybercrime Cost Management Managed IT Services Wearable Technology Risk Management Retail Proactive IT BDR Entertainment Private Cloud Managing Stress Wireless Technology Legal Chromecast Workplace Customer Relationship Management SharePoint User Excel Keyboard Miscelllaneous Administrator Politics Reputation Teamwork Best Available Hiring/Firing HIPAA Scalability Access Presentation Travel Regulations Experience Meetings Website RAM Science Hosted Solution Ebay ISP How To 3D Printing Music End of Support Amazon Running Cable Blogging Phishing CPU Robot Networking Cameras Books Advertising Smart Phones Slow Data Theft Black Market Data storage Human Resources Near Field Communication Electronic Medical Records PDF Windows 8 CloudSync HaaS Uninterrupted Power Supply Instant Messaging Safety Text Messaging Vendor Management Computer Accessories Internet of Things Programming Bloatware Compliance Battery Applications IT consulting Mouse Emergency Artificial Intelligence Computing Distributed Denial of Service Sports Inbound Marketing Emails Automobile Touchpad Audit Branding Network Congestion Cleaning Prodcuctivity eWaste OneNote Twitter Worker Commute Operating Sysytem WIndows 7 Online Backup Storage Save Time Television Files OneDrive Two-factor Authentication Video Games Bring Your Own Device Bluetooth Hacker Paperless Office Trending Display

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...