Contact us today!
(469) 567-0181
(903) 458-9400
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Your Business Can Learn a Thing or Two From Nuclear Power Plant Security

b2ap3_thumbnail_nuclear_it_security_400.jpgWe talk about a lot of frightening technology scenarios for businesses; data loss, identity theft, and expensive hardware failures that can inflict substantial downtime and, therefore, cripple the ability of your business to sustain operations. One industry that has changed the way they manage risk, specifically the potential failure of important security systems, is the nuclear power industry. Any business can learn how to mitigate disaster by looking into the specifics of the two most horrendous nuclear meltdowns in history, the meltdown at Chernobyl in 1986, and the tsunami-induced disaster at Fukushima in 2011.

Continue reading

Lightning Fries 0.000001% of Google’s Data

b2ap3_thumbnail_google_lightning_strike_400.jpgWith so many businesses switching to the cloud for their data storage needs, it’s assumed that their data will be safe and sound. However, this is only somewhat true. While it’s true that the cloud is a secure and effective way to store your data, the virtual cloud is still vulnerable to freak accidents. Take, for example, the time when Google was struck by lightning last month… four times.

Continue reading

Tip of the Week: How to Prevent Your Mobile Data from Leaking Away

b2ap3_thumbnail_mobile_data_eats_money_400.jpgWith more businesses moving toward Bring Your Own Device (BYOD) than ever before, the workforce grows more mobile by the day. These workers generally need a network connection in order to access important data and applications that are crucial to their day-to-day responsibilities. One way to do this is to use your service provider’s mobile data plan, but this can be both expensive and draining when used excessively.

Continue reading

Sign Up for Our Newsletter

Powered by ChronoForms -

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Microsoft Productivity Hackers Malware Software Business Computing Google Business Windows 10 Miscellaneous Workplace Tips Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware Mobile Devices Mobile Computing IT Services Health User Tips Communication IT Support VoIP Business Management Data Quick Tips Smartphone Virtualization Email Holiday Server Network Operating System Saving Money Social Media Upgrade Disaster Recovery Apps Office Alert Going Green Save Money Business Continuity Remote Computing Mobile Device Management Small Business Chrome Android Best Practice The Internet of Things Big Data Managed Service Provider Employer-Employee Relationship Microsoft Office Ransomware Social WiFi Mobility Identity Theft Facebook Antivirus Application Unified Threat Management Hacking Tablet Passwords History Analytics Search Gmail Saving Time Browser Lithium-ion battery Current Events Printer Government Law Enforcement Office Tips Information Technology Password Spam BYOD Bandwidth Avoiding Downtime Work/Life Balance Phone System Encryption Router Apple communications Remote Monitoring Tech Support Telephone Systems Gadgets Humor Smartphones intranet Firewall Users Net Neutrality USB iPhone Collaboration Laptop Recovery Network Security Automation Maintenance Hard Drives Streaming Media Education Fraud User Error Wireless Computers Disaster Data Management Money VPN Business Intelligence Mobile Office Transportation Shortcut Wi-Fi Internet Exlporer Biometrics Social Engineering App Flexibility Telephony Customer Service IT Solutions Virtual Reality IT Consultant Fax Server Google Drive DDoS Data Loss Benefits Outlook Printer Server Office 365 Wearable Technology Proactive IT Cybercrime Marketing Risk Management Administration Online Currency Content Filtering Managing Stress Personal Information Private Cloud Wireless Technology Point of Sale PowerPoint Update Cost Management Retail Managed IT Services BDR Entertainment Budget Hosted Solution Science Workplace Hacker Slow Smart Phones Running Cable Miscelllaneous Phishing Legal End of Support Windows 8 Keyboard Robot Networking HIPAA Advertising Politics Travel Near Field Communication Vendor Management Hiring/Firing Data storage Regulations Human Resources ISP Scalability PDF 3D Printing Experience Uninterrupted Power Supply Computing Text Messaging Computer Accessories How To Music Internet of Things Bloatware Prodcuctivity IT consulting Applications Cameras Artificial Intelligence Distributed Denial of Service Data Theft Mouse Books Online Backup Sports Branding Touchpad eWaste CloudSync Network Congestion Black Market Electronic Medical Records WIndows 7 Display HaaS Operating Sysytem Television Compliance Storage Programming Instant Messaging Safety Files Two-factor Authentication Bluetooth Battery Trending Inbound Marketing Emergency Chromecast Emails Customer Relationship Management Audit SharePoint User Automobile Twitter Excel OneNote Website Cleaning RAM Administrator Teamwork Best Available Ebay Reputation Worker Commute OneDrive Bring Your Own Device Presentation Blogging Save Time CPU Access Amazon Meetings Paperless Office Video Games

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...