Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Use This Test to Calculate Your Employees’ Risk Levels

b2ap3_thumbnail_risk_for_employers_400.jpgWhen it comes to your business’s data security, there can be no room for error. October is Cyber Security Month, so there’s no better time to ensure that your business is taking all of the proper precautions to maximize security protocol. However, there’s an often-forgotten aspect of cybersecurity called employee risk management, and it’s more complex than you might think.

Continue reading

SHOCK: 66% of Fired Employees Able to Access Their Former Company’s Cloud Data

b2ap3_thumbnail_rogue_ex_employees_400.jpgEvery business executive knows the struggle of employee turnover. Your employees might come and go, but your data is one thing that you can’t afford to lose from your business. You might feel that you can trust all of the employees who have put in years of effort to ensure your organization stays afloat, but you may be surprised to learn that a significant number of them will probably leave your company with at least some corporate data.

Continue reading

Tip of the Week: Engage Your Workforce to Improve Employee Retention

b2ap3_thumbnail_bad_leadership_400.jpgThe leaders of today’s business world are staring down a problem unlike anything they’ve seen before; their workforce, or rather, engaging them in their work. A study by Deloitte Global Human Capital Trends shows that a meager 13 percent of employees in the world are legitimately engaged in their work. That’s a pretty small percentage, and to make matters worse, over a quarter of the world’s workforce are disengaged to the point their negativity will impact others.

Continue reading

If You’re Going to Read Employee Emails, You’re Going to Have a Bad Time

b2ap3_thumbnail_angry_boss_monitoring_400.jpgFor many office workers, there seems to be some confusion concerning the privacy of employee-to-employee communications made over a company network. It is okay for an employer to go through an employee’s email or instant messaging history? Many workers may be surprised to learn that an employer is in their legal right to do so.

Continue reading

Does an Unlimited PTO Policy Sound Too Good to Be True?

b2ap3_thumbnail_unlimited_vacation_time_400.jpgPaid time off is somewhat of an anomaly to the business owner. They don’t want to provide too little and destroy morale, yet they don’t want to lose capital by providing too much to their employees. It might seem strange to suggest unlimited paid time off, but according to some business owners, it might be a quality solution to this dilemma, with enough care put into its integration.

Continue reading

Sign Up for Our Newsletter

Powered by ChronoForms -

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Business Software Business Computing Google Windows 10 Miscellaneous Workplace Tips Innovation Computer Backup Efficiency Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing IT Support Communication User Tips Business Management VoIP Smartphone Server Email Network Holiday Data Quick Tips Virtualization Remote Computing Operating System Social Media Upgrade Going Green Office Business Continuity Mobile Device Management Saving Money Disaster Recovery Apps Save Money Alert Chrome Small Business Android Ransomware WiFi Identity Theft The Internet of Things Big Data Mobility Managed Service Provider Antivirus Microsoft Office Social Application Facebook Best Practice Employer-Employee Relationship Bandwidth Saving Time Unified Threat Management Hacking Tablet Lithium-ion battery Printer Passwords BYOD Law Enforcement Analytics History Office Tips Search Gmail Password Browser Current Events Government Information Technology Spam Humor Collaboration Laptop Avoiding Downtime Phone System Router Recovery Apple Network Security Hard Drives Maintenance Automation Fraud Gadgets Smartphones USB Users Wireless Encryption Data Management Money Streaming Media Remote Monitoring Work/Life Balance Tech Support Education communications User Error Computers Disaster intranet Telephone Systems Net Neutrality Firewall iPhone Entertainment Google Drive DDoS Wearable Technology Benefits Proactive IT Mobile Office Online Currency Office 365 Cybercrime Risk Management IT Solutions Managing Stress Private Cloud Wireless Technology Personal Information Outlook Update Printer Server VPN Managed IT Services Marketing Budget Administration Business Intelligence App Transportation Shortcut Content Filtering Internet Exlporer Biometrics Point of Sale PowerPoint Social Engineering Wi-Fi IT Consultant Cost Management Fax Server Telephony Customer Service Flexibility Data Loss Retail BDR Virtual Reality Bring Your Own Device Scalability Text Messaging Online Backup Paperless Office Computer Accessories Experience Workplace Internet of Things Bloatware IT consulting How To Applications Music Artificial Intelligence Distributed Denial of Service Miscelllaneous Mouse Display Sports Branding Touchpad Books eWaste HIPAA Network Congestion Travel Regulations WIndows 7 Black Market Operating Sysytem Electronic Medical Records Television Storage ISP 3D Printing HaaS Files Two-factor Authentication Bluetooth Instant Messaging Website Safety RAM Trending Ebay Chromecast Customer Relationship Management Cameras SharePoint User Battery Blogging Emergency CPU Data Theft Excel Amazon Administrator Teamwork Best Available Automobile Reputation Cleaning Slow CloudSync Smart Phones Presentation Access Meetings Worker Commute Windows 8 Save Time Hosted Solution Compliance Science Programming Video Games End of Support Running Cable Phishing Vendor Management Hacker Inbound Marketing Emails Networking Audit Legal Robot Advertising OneNote Keyboard Twitter Computing Human Resources Near Field Communication Data storage PDF Politics OneDrive Hiring/Firing Uninterrupted Power Supply Prodcuctivity

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...