Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Not so Fast! Why Your Deleted Files May Still Be on Your Hard Drive

b2ap3_thumbnail_this_happens_to_deleted_data_400.jpgMarch 31st is World Backup Day! Just as important as having a plan in place to backup your data is having a way to recover your files. Do you have a way to restore files that get lost, corrupted, or accidentally deleted? To highlight this need, we want to explain how a deleted file can actually be recovered.

Continue reading
0 Comments

2 Useful Mobile Apps for Every Modern Office Worker

b2ap3_thumbnail_crucial_business_app_400.jpgThe modern office only resembles the office of the past. Sure there are still desks and chairs and cork boards hanging on the walls. There are still printers, copiers, and maybe even a fax machine (although many times nowadays all of those tasks are handled by the same machine). The differences, though often understated, are prevalent; with advancements in technology being the most noteworthy change. The most evident of which, is the widespread use of employee-owned mobile devices.

Continue reading
0 Comments

Fact: USPS Makes $8 Million Per Year Selling Your Personal Data

b2ap3_thumbnail_data_mining_ups_400.jpgUnless you have been vigilant about covering your digital tracks, you’ve likely got your personal information floating all over cyberspace and it’s being used for who knows what. Most of this personal data is used for marketing purposes, but hackers like to get in on the data-collecting action too. Being aware of how your personal data is collected is the first step towards getting a handle on it.

Continue reading
0 Comments

There’s an Important Difference Between Data and Information

b2ap3_thumbnail_information_data_400.jpgYou can’t have IT without information, you can’t have information without data, and technology is what creates data so that you can better use your company’s technology to increase sales. Got it? Understanding the flow of data can be confusing. It’s important to have a handle on it so you can leverage your data for the success of your business.

Continue reading
0 Comments

Your Business Needs a Data Destruction Plan to Minimize Liability

b2ap3_thumbnail_destruction_of_company_data_400.jpgConventional wisdom informs businesses to store every byte of their data possible, and with the affordability of cloud storage, more companies are storing more files. Surprisingly, in an aboutface to this maximum data-storage practice, businesses are now being advised to delete all unnecessary data in light of our lawsuit-happy culture.

Continue reading
0 Comments

Your Logs Hold the Secrets to Increase Network Performance and Security

b2ap3_thumbnail_keep_logs_around_400.jpgUsers log on and off your company's network all day long. You may think, "No big deal. It's part of the process." But data extrapolated from user logs is a big deal. It can provide your business with valuable information about network security and give you insight on how to improve operations.

Continue reading
0 Comments

Tomorrow Never Downloads: Protecting Your Database from Corporate and International Espionage

b2ap3_thumbnail_security_from_espionage_400.jpgFirewalls are the first thing companies think of when it comes to data security. What is the last security risk on an organization's mind? Your most tech-savvy employee. If someone were to "get to" the employee overseeing your network, they would be able to do some serious damage. What are you doing to protect your data from the employees you trust the most?

Continue reading
0 Comments

Enjoy the Party – Let the Hosts Do the Hard Work for You!

b2ap3_thumbnail_cloud_maintenance_400.jpgHosting the party isn't for everyone; it's a matter of space, cost, and responsibility. You could be the life of the party, but nobody would know because you're so busy making sure that everything is set and ready to rumble. Wouldn't it be easier if you could just hire someone to take care of all the little details for you, so you could enjoy the fruits of your labor?

Continue reading
0 Comments

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Business Software Business Computing Google Workplace Tips Windows 10 Miscellaneous Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing User Tips IT Support Communication VoIP Business Management Server Holiday Network Data Quick Tips Virtualization Smartphone Email Going Green Business Continuity Mobile Device Management Saving Money Save Money Disaster Recovery Apps Remote Computing Alert Operating System Social Media Upgrade Office Small Business Android Chrome Antivirus Social Application Facebook Best Practice Employer-Employee Relationship Ransomware The Internet of Things WiFi Big Data Identity Theft Managed Service Provider Mobility Microsoft Office Law Enforcement Analytics History Office Tips Search Gmail BYOD Password Browser Current Events Government Information Technology Spam Bandwidth Unified Threat Management Hacking Tablet Saving Time Lithium-ion battery Passwords Printer USB Fraud Users Wireless Data Management Money Streaming Media Encryption Education communications User Error Remote Monitoring Work/Life Balance Computers Tech Support Disaster Telephone Systems Humor intranet Net Neutrality Firewall Avoiding Downtime Phone System iPhone Laptop Collaboration Router Recovery Apple Network Security Automation Hard Drives Gadgets Maintenance Smartphones Outlook Update Printer Server Personal Information Marketing Budget Administration VPN Business Intelligence Transportation Shortcut Managed IT Services Content Filtering Internet Exlporer Biometrics Point of Sale PowerPoint Social Engineering App Cost Management Telephony Customer Service Retail BDR Wi-Fi Virtual Reality Entertainment IT Consultant Fax Server Google Drive DDoS Flexibility Data Loss Benefits Mobile Office Wearable Technology Proactive IT Cybercrime Risk Management IT Solutions Office 365 Online Currency Managing Stress Private Cloud Wireless Technology Chromecast Electronic Medical Records Customer Relationship Management Cameras SharePoint HaaS User Instant Messaging Data Theft Excel Website RAM Administrator Safety Teamwork Best Available Ebay Reputation Battery CloudSync Amazon Presentation Blogging CPU Access Emergency Meetings Hosted Solution Automobile Compliance Science Programming Smart Phones Slow Cleaning Running Cable Phishing End of Support Worker Commute Inbound Marketing Audit Windows 8 Robot Save Time Emails Networking Advertising Video Games Twitter OneNote Human Resources Near Field Communication Vendor Management Data storage Hacker PDF Legal OneDrive Uninterrupted Power Supply Computing Bring Your Own Device Keyboard Text Messaging Paperless Office Computer Accessories Workplace Internet of Things Politics Bloatware Prodcuctivity IT consulting Applications Hiring/Firing Artificial Intelligence Distributed Denial of Service Scalability Miscelllaneous Mouse Online Backup Sports Experience Branding Touchpad eWaste How To HIPAA Network Congestion Music Travel Regulations WIndows 7 Display Operating Sysytem Television Storage ISP 3D Printing Files Books Two-factor Authentication Bluetooth Trending Black Market

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code