Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Your Business Can Learn a Thing or Two From Nuclear Power Plant Security

b2ap3_thumbnail_nuclear_it_security_400.jpgWe talk about a lot of frightening technology scenarios for businesses; data loss, identity theft, and expensive hardware failures that can inflict substantial downtime and, therefore, cripple the ability of your business to sustain operations. One industry that has changed the way they manage risk, specifically the potential failure of important security systems, is the nuclear power industry. Any business can learn how to mitigate disaster by looking into the specifics of the two most horrendous nuclear meltdowns in history, the meltdown at Chernobyl in 1986, and the tsunami-induced disaster at Fukushima in 2011.

Continue reading

Lightning Fries 0.000001% of Google’s Data

b2ap3_thumbnail_google_lightning_strike_400.jpgWith so many businesses switching to the cloud for their data storage needs, it’s assumed that their data will be safe and sound. However, this is only somewhat true. While it’s true that the cloud is a secure and effective way to store your data, the virtual cloud is still vulnerable to freak accidents. Take, for example, the time when Google was struck by lightning last month… four times.

Continue reading

Tip of the Week: How to Prevent Your Mobile Data from Leaking Away

b2ap3_thumbnail_mobile_data_eats_money_400.jpgWith more businesses moving toward Bring Your Own Device (BYOD) than ever before, the workforce grows more mobile by the day. These workers generally need a network connection in order to access important data and applications that are crucial to their day-to-day responsibilities. One way to do this is to use your service provider’s mobile data plan, but this can be both expensive and draining when used excessively.

Continue reading

Sign Up for Our Newsletter

Powered by ChronoForms -

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Business Software Business Computing Google Miscellaneous Workplace Tips Windows 10 Innovation Computer Backup Efficiency Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing Communication IT Support User Tips Business Management VoIP Email Holiday Server Network Data Quick Tips Virtualization Smartphone Office Going Green Business Continuity Mobile Device Management Save Money Saving Money Remote Computing Disaster Recovery Operating System Apps Social Media Alert Upgrade Android Small Business Chrome Managed Service Provider WiFi Mobility Microsoft Office Identity Theft Social Application Antivirus Facebook Best Practice Employer-Employee Relationship Ransomware The Internet of Things Big Data Passwords Saving Time Law Enforcement Lithium-ion battery Office Tips Analytics History Gmail Printer Search Password Browser Current Events Government BYOD Information Technology Spam Bandwidth Unified Threat Management Hacking Tablet Collaboration Laptop Gadgets Smartphones Users USB Maintenance Hard Drives Fraud Money Wireless Data Management Streaming Media Education User Error communications Work/Life Balance Computers Disaster Encryption Telephone Systems Humor Remote Monitoring Avoiding Downtime Tech Support Phone System Router Recovery Apple Network Security intranet Firewall Automation Net Neutrality iPhone Office 365 Wearable Technology Private Cloud Managing Stress Wireless Technology Proactive IT Outlook Printer Server Online Currency Update Personal Information Marketing Budget Administration Transportation Shortcut Business Intelligence Managed IT Services Content Filtering Internet Exlporer Biometrics Point of Sale PowerPoint Social Engineering Customer Service Cost Management VPN Telephony Retail Virtual Reality BDR Wi-Fi Google Drive Entertainment DDoS Flexibility App Benefits Mobile Office IT Consultant Fax Server Cybercrime Data Loss IT Solutions Risk Management Storage ISP Television Files Books Two-factor Authentication Online Backup 3D Printing Bluetooth Trending Black Market Chromecast Electronic Medical Records Customer Relationship Management Display Cameras SharePoint HaaS User Data Theft Excel Instant Messaging Administrator Safety Reputation Teamwork Best Available CloudSync Battery Access Emergency Presentation Meetings Compliance Science Programming Hosted Solution Automobile Cleaning Website RAM End of Support Ebay Running Cable Phishing Inbound Marketing Worker Commute Robot Save Time Blogging Emails Networking CPU Audit Amazon Advertising Video Games Twitter OneNote Data storage Hacker Human Resources Slow Near Field Communication Smart Phones PDF Legal OneDrive Uninterrupted Power Supply Keyboard Windows 8 Bring Your Own Device Text Messaging Paperless Office Computer Accessories Politics Bloatware Workplace Internet of Things Applications Hiring/Firing Vendor Management IT consulting Artificial Intelligence Distributed Denial of Service Scalability Miscelllaneous Mouse Sports Experience Computing Touchpad Branding HIPAA Network Congestion eWaste How To Music Travel Prodcuctivity Operating Sysytem Regulations WIndows 7

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...