Contact us today!
(469) 567-0181
(903) 458-9400
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

BYOD Privacy: When Two Phones are Better Than One

b2ap3_thumbnail_bring_your_own_device_400.jpgBring Your Own Device (BYOD) has been a hot IT trend for the past few years. Initially, everybody loved the idea of workers using their personal smartphone for work and organizations were quick to adopt BYOD. Now, after years of trying out the policy, companies and employees are having reservations about BYOD, making some even long for the days of Blackberry.

Continue reading

Old Devices Can Compromise Security

b2ap3_thumbnail_device_security_400.jpgAs a responsible business owner, you know that using the latest technology and running updated software is a key component to your company's network security. However, your employees may not value the latest tech like you do, which could result in a major data breach, despite your best efforts to keep your company current.

Continue reading

Old Mobile Devices Might Be Hurting Your Business’s Security

b2ap3_thumbnail_old_tech_security_risk_400.jpgOne of the greatest things about today's technology is that it has grown more mobile, and some employees like to bring their own devices from home to use for their workplace. This is called BYOD, and while it is useful sometimes, it might be putting your business at risk.

Continue reading

Is Your Business Ready for the Security Challenges of Wearable Tech?

b2ap3_thumbnail_wearable_security_400.jpgDue to the growing popularity of employees using their personal devices in the workplace (BYOD), many companies have created BYOD policies to handle the unique security threats brought about by these devices. Does the new trend of wearable technology mean that you need a separate WYOD policy?

Continue reading

Sign Up for Our Newsletter

Powered by ChronoForms -

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Software Business Business Computing Google Windows 10 Miscellaneous Workplace Tips Innovation Computer Backup Efficiency Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing IT Support Communication User Tips Business Management VoIP Smartphone Server Email Network Holiday Data Quick Tips Virtualization Operating System Social Media Upgrade Going Green Office Business Continuity Mobile Device Management Saving Money Apps Disaster Recovery Alert Save Money Remote Computing Chrome Small Business Android Identity Theft The Internet of Things Mobility Antivirus Big Data Managed Service Provider Microsoft Office Social Application Facebook Best Practice Employer-Employee Relationship WiFi Ransomware Unified Threat Management Lithium-ion battery Hacking Tablet Printer Passwords BYOD Law Enforcement Office Tips Analytics History Gmail Search Password Browser Current Events Government Information Technology Spam Saving Time Bandwidth Avoiding Downtime Phone System Router Hard Drives Recovery Maintenance Apple Network Security Automation Fraud Gadgets Smartphones Users USB Wireless Encryption Data Management Money Remote Monitoring Work/Life Balance Tech Support Streaming Media Education User Error communications intranet Net Neutrality Firewall Computers iPhone Disaster Laptop Telephone Systems Collaboration Humor Mobile Office Benefits Office 365 Online Currency Cybercrime IT Solutions Risk Management Personal Information Private Cloud Managing Stress Wireless Technology Outlook VPN Printer Server Update Managed IT Services Marketing Budget Administration App Transportation Shortcut Business Intelligence Content Filtering Internet Exlporer Wi-Fi Point of Sale IT Consultant Biometrics Fax Server PowerPoint Social Engineering Flexibility Telephony Customer Service Data Loss Cost Management Retail Wearable Technology Virtual Reality BDR Google Drive Entertainment DDoS Proactive IT Internet of Things Bloatware Music Workplace Applications Display IT consulting Miscelllaneous Mouse Artificial Intelligence Distributed Denial of Service Sports Books Touchpad Branding HIPAA Network Congestion Black Market eWaste Travel Electronic Medical Records HaaS Operating Sysytem Regulations WIndows 7 Storage Instant Messaging ISP Television Files Two-factor Authentication Website Safety RAM 3D Printing Bluetooth Ebay Battery Trending Chromecast Amazon Customer Relationship Management Blogging Emergency CPU Cameras SharePoint User Data Theft Excel Automobile Administrator Smart Phones Cleaning Slow Reputation Teamwork Best Available CloudSync Worker Commute Access Windows 8 Save Time Presentation Video Games Meetings Hosted Solution Compliance Science Programming Vendor Management Hacker Phishing Legal End of Support Running Cable Inbound Marketing Robot Computing Emails Networking Keyboard Audit Advertising Twitter Politics OneNote Data storage Prodcuctivity Human Resources Hiring/Firing Near Field Communication Scalability PDF Uninterrupted Power Supply Experience OneDrive Online Backup Bring Your Own Device Paperless Office Computer Accessories How To Text Messaging

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...