Contact us today!
(469) 567-0181
(903) 458-9400
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

BYOD Privacy: When Two Phones are Better Than One

b2ap3_thumbnail_bring_your_own_device_400.jpgBring Your Own Device (BYOD) has been a hot IT trend for the past few years. Initially, everybody loved the idea of workers using their personal smartphone for work and organizations were quick to adopt BYOD. Now, after years of trying out the policy, companies and employees are having reservations about BYOD, making some even long for the days of Blackberry.

Continue reading
0 Comments

Old Devices Can Compromise Security

b2ap3_thumbnail_device_security_400.jpgAs a responsible business owner, you know that using the latest technology and running updated software is a key component to your company's network security. However, your employees may not value the latest tech like you do, which could result in a major data breach, despite your best efforts to keep your company current.

Continue reading
0 Comments

Old Mobile Devices Might Be Hurting Your Business’s Security

b2ap3_thumbnail_old_tech_security_risk_400.jpgOne of the greatest things about today's technology is that it has grown more mobile, and some employees like to bring their own devices from home to use for their workplace. This is called BYOD, and while it is useful sometimes, it might be putting your business at risk.

Continue reading
0 Comments

Is Your Business Ready for the Security Challenges of Wearable Tech?

b2ap3_thumbnail_wearable_security_400.jpgDue to the growing popularity of employees using their personal devices in the workplace (BYOD), many companies have created BYOD policies to handle the unique security threats brought about by these devices. Does the new trend of wearable technology mean that you need a separate WYOD policy?

Continue reading
0 Comments

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Best Practices Cloud Internet Microsoft Productivity Hackers Malware Business Computing Google Business Software Windows 10 Miscellaneous Workplace Tips Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware Mobile Computing IT Services Health Mobile Devices IT Support Communication User Tips VoIP Business Management Holiday Virtualization Server Network Smartphone Data Quick Tips Email Disaster Recovery Apps Alert Save Money Remote Computing Going Green Operating System Business Continuity Social Media Mobile Device Management Upgrade Saving Money Office Android Chrome Small Business Best Practice Social Employer-Employee Relationship Facebook Ransomware WiFi Identity Theft Antivirus Mobility The Internet of Things Big Data Application Managed Service Provider Microsoft Office Analytics History Gmail Search Browser Current Events Government Saving Time Lithium-ion battery Information Technology Printer Spam Bandwidth Unified Threat Management BYOD Hacking Law Enforcement Tablet Office Tips Password Passwords Remote Monitoring Users USB Tech Support communications Work/Life Balance intranet Firewall Telephone Systems Net Neutrality iPhone Collaboration Humor Laptop Streaming Media Education User Error Recovery Maintenance Computers Network Security Disaster Hard Drives Automation Fraud Avoiding Downtime Phone System Router Apple Encryption Wireless Money Gadgets Data Management Smartphones Managed IT Services Internet Exlporer Outlook Printer Server Biometrics Social Engineering Telephony Customer Service IT Consultant Fax Server Marketing Data Loss Virtual Reality Wi-Fi Administration Google Drive Flexibility DDoS Wearable Technology Content Filtering Benefits Proactive IT Point of Sale PowerPoint Cost Management Online Currency Cybercrime Retail Risk Management BDR Entertainment Office 365 Private Cloud Managing Stress Wireless Technology Mobile Office Update Personal Information VPN IT Solutions Budget Transportation Shortcut Business Intelligence App End of Support Running Cable Phishing Vendor Management Cameras Worker Commute Data Theft Robot Networking Save Time Video Games Advertising Computing CloudSync Data storage Human Resources Near Field Communication Hacker Legal PDF Uninterrupted Power Supply Prodcuctivity Compliance Programming Keyboard Computer Accessories Online Backup Text Messaging Internet of Things Bloatware Politics Inbound Marketing Applications IT consulting Hiring/Firing Mouse Emails Scalability Artificial Intelligence Audit Distributed Denial of Service Sports Display Experience Twitter Touchpad OneNote Branding Network Congestion How To eWaste Music Operating Sysytem OneDrive WIndows 7 Storage Bring Your Own Device Television Files Two-factor Authentication Books Paperless Office Workplace Bluetooth Website Black Market RAM Trending Chromecast Customer Relationship Management Ebay Electronic Medical Records Miscelllaneous HaaS SharePoint User Amazon Excel Blogging Instant Messaging CPU Administrator Safety HIPAA Travel Reputation Teamwork Best Available Smart Phones Regulations Battery Slow Access ISP Presentation Emergency Meetings 3D Printing Science Windows 8 Automobile Hosted Solution Cleaning

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code