Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

BYOD Privacy: When Two Phones are Better Than One

b2ap3_thumbnail_bring_your_own_device_400.jpgBring Your Own Device (BYOD) has been a hot IT trend for the past few years. Initially, everybody loved the idea of workers using their personal smartphone for work and organizations were quick to adopt BYOD. Now, after years of trying out the policy, companies and employees are having reservations about BYOD, making some even long for the days of Blackberry.

Continue reading

Old Devices Can Compromise Security

b2ap3_thumbnail_device_security_400.jpgAs a responsible business owner, you know that using the latest technology and running updated software is a key component to your company's network security. However, your employees may not value the latest tech like you do, which could result in a major data breach, despite your best efforts to keep your company current.

Continue reading

Old Mobile Devices Might Be Hurting Your Business’s Security

b2ap3_thumbnail_old_tech_security_risk_400.jpgOne of the greatest things about today's technology is that it has grown more mobile, and some employees like to bring their own devices from home to use for their workplace. This is called BYOD, and while it is useful sometimes, it might be putting your business at risk.

Continue reading

Is Your Business Ready for the Security Challenges of Wearable Tech?

b2ap3_thumbnail_wearable_security_400.jpgDue to the growing popularity of employees using their personal devices in the workplace (BYOD), many companies have created BYOD policies to handle the unique security threats brought about by these devices. Does the new trend of wearable technology mean that you need a separate WYOD policy?

Continue reading

Sign Up for Our Newsletter

Powered by ChronoForms -

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Business Software Business Computing Google Windows 10 Miscellaneous Workplace Tips Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing IT Support User Tips Communication VoIP Business Management Server Network Data Quick Tips Smartphone Email Virtualization Holiday Going Green Save Money Remote Computing Business Continuity Mobile Device Management Operating System Social Media Saving Money Upgrade Disaster Recovery Apps Office Alert Android Chrome Small Business Ransomware Social WiFi Facebook Identity Theft Antivirus Application The Internet of Things Mobility Big Data Best Practice Managed Service Provider Microsoft Office Employer-Employee Relationship Analytics History Search Gmail Saving Time Browser Current Events Lithium-ion battery Government Printer Information Technology Spam Law Enforcement Bandwidth Office Tips BYOD Unified Threat Management Password Hacking Tablet Passwords Firewall Humor Net Neutrality Wireless iPhone Collaboration Laptop Recovery Network Security Streaming Media Automation Work/Life Balance Maintenance Education Hard Drives User Error Fraud Computers Disaster Avoiding Downtime Phone System Router Money Data Management Encryption Apple Remote Monitoring Tech Support Gadgets communications Smartphones Users USB Telephone Systems intranet Printer Server Data Loss Google Drive DDoS Benefits Wearable Technology Managed IT Services Marketing Proactive IT Administration Online Currency Content Filtering Cybercrime Risk Management Point of Sale Wi-Fi PowerPoint Private Cloud Cost Management Managing Stress Flexibility Wireless Technology Retail BDR Entertainment Update Mobile Office Budget VPN Office 365 Shortcut Business Intelligence Transportation Internet Exlporer App IT Solutions Biometrics Social Engineering Telephony Customer Service Personal Information IT Consultant Fax Server Outlook Virtual Reality Emergency Data Theft Prodcuctivity Text Messaging Computer Accessories Automobile Internet of Things Bloatware Applications Online Backup IT consulting Cleaning CloudSync Artificial Intelligence Distributed Denial of Service Mouse Worker Commute Sports Touchpad Programming Branding Save Time Compliance Video Games Display eWaste Network Congestion Operating Sysytem WIndows 7 Hacker Inbound Marketing Legal Emails Audit Television Storage Two-factor Authentication Files Twitter OneNote Bluetooth Keyboard Trending Customer Relationship Management Politics Chromecast Website OneDrive SharePoint RAM User Hiring/Firing Scalability Ebay Bring Your Own Device Excel Experience Paperless Office Administrator Amazon Reputation Blogging Workplace Teamwork CPU Best Available How To Presentation Music Miscelllaneous Access Smart Phones Meetings Slow Hosted Solution Science Books HIPAA Travel End of Support Windows 8 Running Cable Phishing Black Market Regulations ISP Networking Electronic Medical Records Robot HaaS Advertising Vendor Management 3D Printing Instant Messaging Human Resources Near Field Communication Safety Data storage Computing PDF Battery Cameras Uninterrupted Power Supply

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...