Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Your Business Can Learn a Thing or Two From Nuclear Power Plant Security

b2ap3_thumbnail_nuclear_it_security_400.jpgWe talk about a lot of frightening technology scenarios for businesses; data loss, identity theft, and expensive hardware failures that can inflict substantial downtime and, therefore, cripple the ability of your business to sustain operations. One industry that has changed the way they manage risk, specifically the potential failure of important security systems, is the nuclear power industry. Any business can learn how to mitigate disaster by looking into the specifics of the two most horrendous nuclear meltdowns in history, the meltdown at Chernobyl in 1986, and the tsunami-induced disaster at Fukushima in 2011.

Continue reading

Lightning Fries 0.000001% of Google’s Data

b2ap3_thumbnail_google_lightning_strike_400.jpgWith so many businesses switching to the cloud for their data storage needs, it’s assumed that their data will be safe and sound. However, this is only somewhat true. While it’s true that the cloud is a secure and effective way to store your data, the virtual cloud is still vulnerable to freak accidents. Take, for example, the time when Google was struck by lightning last month… four times.

Continue reading

Tip of the Week: How to Prevent Your Mobile Data from Leaking Away

b2ap3_thumbnail_mobile_data_eats_money_400.jpgWith more businesses moving toward Bring Your Own Device (BYOD) than ever before, the workforce grows more mobile by the day. These workers generally need a network connection in order to access important data and applications that are crucial to their day-to-day responsibilities. One way to do this is to use your service provider’s mobile data plan, but this can be both expensive and draining when used excessively.

Continue reading

Sign Up for Our Newsletter

Powered by ChronoForms -

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Microsoft Productivity Hackers Malware Software Business Computing Google Business Workplace Tips Miscellaneous Windows 10 Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing User Tips Communication IT Support VoIP Business Management Network Data Quick Tips Smartphone Virtualization Email Holiday Server Save Money Business Continuity Mobile Device Management Remote Computing Saving Money Operating System Social Media Upgrade Apps Disaster Recovery Alert Office Going Green Small Business Chrome Android Mobility The Internet of Things Application Big Data Managed Service Provider Best Practice Microsoft Office WiFi Employer-Employee Relationship Social Identity Theft Ransomware Facebook Antivirus BYOD Information Technology Spam Bandwidth Law Enforcement Unified Threat Management Office Tips Password Hacking Tablet Passwords Saving Time Analytics History Search Gmail Lithium-ion battery Browser Printer Current Events Government Automation User Error Computers Disaster Avoiding Downtime Encryption Phone System Wireless Router Remote Monitoring Apple Tech Support Data Management Money Work/Life Balance Gadgets intranet Net Neutrality Smartphones Firewall communications iPhone Laptop USB Collaboration Users Telephone Systems Humor Hard Drives Maintenance Streaming Media Recovery Fraud Network Security Education Point of Sale Cybercrime Risk Management PowerPoint Cost Management Managing Stress Retail Private Cloud BDR Wireless Technology Entertainment Personal Information VPN Update Mobile Office App Managed IT Services Budget Business Intelligence IT Solutions Transportation Shortcut IT Consultant Fax Server Internet Exlporer Biometrics Data Loss Wi-Fi Social Engineering Telephony Customer Service Wearable Technology Outlook Flexibility Printer Server Virtual Reality Proactive IT Google Drive DDoS Online Currency Marketing Benefits Administration Content Filtering Office 365 Audit Emails WIndows 7 Website RAM Operating Sysytem Black Market Electronic Medical Records Television Storage Ebay Twitter OneNote Files HaaS Two-factor Authentication Bluetooth Amazon Blogging CPU Instant Messaging OneDrive Safety Trending Bring Your Own Device Chromecast Customer Relationship Management SharePoint Smart Phones User Paperless Office Slow Battery Workplace Emergency Excel Administrator Teamwork Best Available Windows 8 Miscelllaneous Reputation Automobile Cleaning Presentation Access Worker Commute Meetings Vendor Management HIPAA Save Time Hosted Solution Science Travel Regulations Video Games Running Cable Computing Phishing ISP End of Support Hacker 3D Printing Robot Legal Networking Prodcuctivity Advertising Keyboard Cameras Near Field Communication Online Backup Data storage Human Resources Politics Data Theft PDF Hiring/Firing Uninterrupted Power Supply Scalability Text Messaging Experience Computer Accessories Display CloudSync Internet of Things Bloatware IT consulting Applications How To Artificial Intelligence Music Distributed Denial of Service Mouse Compliance Programming Sports Branding Touchpad Books eWaste Network Congestion Inbound Marketing

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...