Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Your Business Can Learn a Thing or Two From Nuclear Power Plant Security

b2ap3_thumbnail_nuclear_it_security_400.jpgWe talk about a lot of frightening technology scenarios for businesses; data loss, identity theft, and expensive hardware failures that can inflict substantial downtime and, therefore, cripple the ability of your business to sustain operations. One industry that has changed the way they manage risk, specifically the potential failure of important security systems, is the nuclear power industry. Any business can learn how to mitigate disaster by looking into the specifics of the two most horrendous nuclear meltdowns in history, the meltdown at Chernobyl in 1986, and the tsunami-induced disaster at Fukushima in 2011.

Continue reading

Lightning Fries 0.000001% of Google’s Data

b2ap3_thumbnail_google_lightning_strike_400.jpgWith so many businesses switching to the cloud for their data storage needs, it’s assumed that their data will be safe and sound. However, this is only somewhat true. While it’s true that the cloud is a secure and effective way to store your data, the virtual cloud is still vulnerable to freak accidents. Take, for example, the time when Google was struck by lightning last month… four times.

Continue reading

Tip of the Week: How to Prevent Your Mobile Data from Leaking Away

b2ap3_thumbnail_mobile_data_eats_money_400.jpgWith more businesses moving toward Bring Your Own Device (BYOD) than ever before, the workforce grows more mobile by the day. These workers generally need a network connection in order to access important data and applications that are crucial to their day-to-day responsibilities. One way to do this is to use your service provider’s mobile data plan, but this can be both expensive and draining when used excessively.

Continue reading

Sign Up for Our Newsletter

Powered by ChronoForms -

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Business Software Business Computing Google Miscellaneous Workplace Tips Windows 10 Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing IT Support User Tips Communication VoIP Business Management Server Network Data Quick Tips Smartphone Email Virtualization Holiday Going Green Save Money Remote Computing Business Continuity Mobile Device Management Operating System Saving Money Social Media Upgrade Disaster Recovery Apps Office Alert Android Chrome Small Business Social Application Facebook WiFi Identity Theft Best Practice Mobility Antivirus Employer-Employee Relationship Ransomware The Internet of Things Big Data Managed Service Provider Microsoft Office Analytics History Office Tips Search Gmail Password Saving Time Browser Current Events Lithium-ion battery Government Printer Information Technology Spam BYOD Bandwidth Unified Threat Management Hacking Tablet Passwords Law Enforcement Net Neutrality Firewall iPhone Collaboration Laptop Money Data Management Streaming Media Education Hard Drives Maintenance communications User Error Fraud Computers Disaster Telephone Systems Humor Avoiding Downtime Phone System Router Wireless Recovery Encryption Apple Network Security Automation Remote Monitoring Gadgets Tech Support Smartphones Work/Life Balance USB Users intranet Data Loss Update Printer Server Flexibility Wearable Technology Marketing Budget Proactive IT Administration Shortcut Business Intelligence Transportation Online Currency Content Filtering Internet Exlporer Biometrics Point of Sale Office 365 PowerPoint Social Engineering Cost Management Telephony Customer Service Retail BDR Virtual Reality Entertainment Google Drive DDoS Personal Information Benefits Mobile Office VPN Managed IT Services Cybercrime Risk Management App IT Solutions Managing Stress Private Cloud Wireless Technology IT Consultant Fax Server Outlook Wi-Fi Keyboard Data Theft Excel Administrator Prodcuctivity Teamwork Best Available Politics Reputation Online Backup Hiring/Firing CloudSync Presentation Scalability Access Meetings Experience Hosted Solution Compliance Science Programming Display How To End of Support Running Cable Phishing Music Inbound Marketing Emails Networking Audit Robot Advertising Books OneNote Twitter Human Resources Near Field Communication Black Market Data storage Electronic Medical Records PDF OneDrive RAM HaaS Uninterrupted Power Supply Website Ebay Bring Your Own Device Instant Messaging Safety Text Messaging Paperless Office Computer Accessories Blogging Workplace CPU Internet of Things Amazon Bloatware IT consulting Battery Applications Emergency Artificial Intelligence Distributed Denial of Service Miscelllaneous Mouse Slow Sports Smart Phones Branding Automobile Touchpad Cleaning eWaste HIPAA Network Congestion Windows 8 Travel Regulations WIndows 7 Worker Commute Operating Sysytem Save Time Television Storage ISP Vendor Management 3D Printing Video Games Files Two-factor Authentication Bluetooth Hacker Trending Legal Chromecast Computing Customer Relationship Management Cameras SharePoint User

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...