Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

For Emergency Purposes Only: Users Can Now Activate Facebook’s Safety Check

For Emergency Purposes Only: Users Can Now Activate Facebook’s Safety Check

Since 2014, Facebook has quietly featured Safety Check, a crisis response tool that lets users in areas struck by natural disasters or other emergencies to confirm their safety on the social network. Originally, Facebook itself would have to activate a Safety Check, but that has changed--the power to activate a safety check is now in the hands of the stricken community.

Continue reading
0 Comments

Tip of the Week: How to Download Everything You’ve Posted to Facebook

Tip of the Week: How to Download Everything You’ve Posted to Facebook

If you’ve had your Facebook profile since the dawn of the social media age, chances are that it’s accumulated an immense amount of personal information. While you might have felt weird handing over all of this data to Facebook, the company has made it surprisingly easy to take it back; well, as much as you can, at least.

Continue reading
0 Comments

Tip of the Week: 4 Ways to Get a Handle on Social Media in the Workplace

Tip of the Week: 4 Ways to Get a Handle on Social Media in the Workplace

Social media may be a great way to connect with other professionals and communicate with your friends, but it can be dangerous if you have poor posting habits. Before you share something, think twice about whether it contains any sensitive information that could be risky to yourself and your business.

Continue reading
0 Comments

Tip of the Week: 3 Ways to Secure Your Facebook Account

b2ap3_thumbnail_facebook_security_400.jpgThe social media revolution has taken the world by storm, so much in fact that some people are completely at the mercy of their smartphones. However, the dark side of social media, especially Facebook, grows more apparent every day, especially when it comes to both cybersecurity and personal privacy. Are you sure that your Facebook settings aren’t giving away a little too much of your information to the powers that be?

Continue reading
0 Comments

As the Facebook Empire Grows, the Acquisitions Keep Coming

b2ap3_thumbnail_facebook_is_buying_400.jpgIt's no secret that Facebook is one of the most visited sites on the Internet. In fact, according to the Alexa rankings, which measure website traffic, facebook.com is ranked second after only Google.com. With this much exposure, and the emanated revenue that comes from this kind of traffic, it has become important for the world's largest and most successful social network to scout out and eliminate possible competitors, many times before those companies even consider themselves potential competitors.

Continue reading
0 Comments

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Software Business Computing Google Business Miscellaneous Windows 10 Workplace Tips Backup Efficiency Innovation Computer Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing User Tips Communication IT Support Business Management VoIP Server Network Smartphone Data Quick Tips Email Holiday Virtualization Save Money Going Green Remote Computing Business Continuity Mobile Device Management Operating System Social Media Upgrade Saving Money Office Apps Disaster Recovery Alert Chrome Small Business Android Antivirus The Internet of Things Big Data Managed Service Provider Application Microsoft Office Social Best Practice Facebook Mobility Employer-Employee Relationship WiFi Identity Theft Ransomware Lithium-ion battery Printer Information Technology Spam Bandwidth Unified Threat Management BYOD Hacking Tablet Law Enforcement Office Tips Passwords Password Analytics History Search Gmail Browser Saving Time Current Events Government User Error Hard Drives Maintenance Computers Disaster Recovery Fraud Network Security Wireless Automation Avoiding Downtime Phone System Router Apple Work/Life Balance Encryption Gadgets Smartphones Remote Monitoring Data Management Tech Support Money Users USB intranet Net Neutrality Firewall iPhone communications Collaboration Laptop Telephone Systems Streaming Media Humor Education Online Currency Point of Sale Benefits PowerPoint Personal Information Cost Management Retail BDR Entertainment Cybercrime Risk Management Managed IT Services Mobile Office Managing Stress Private Cloud Wireless Technology VPN Update Wi-Fi IT Solutions App Flexibility Budget Business Intelligence Transportation Outlook Shortcut IT Consultant Printer Server Fax Server Internet Exlporer Data Loss Biometrics Social Engineering Marketing Telephony Office 365 Customer Service Wearable Technology Administration Proactive IT Virtual Reality Content Filtering Google Drive DDoS Emails Audit Internet of Things Instant Messaging Bloatware IT consulting Applications Safety Twitter Artificial Intelligence OneNote Distributed Denial of Service Mouse Sports Battery Branding Touchpad Emergency OneDrive eWaste Network Congestion Bring Your Own Device Automobile RAM WIndows 7 Paperless Office Operating Sysytem Website Cleaning Ebay Workplace Television Storage Files Worker Commute Two-factor Authentication Bluetooth CPU Amazon Miscelllaneous Blogging Save Time Trending Video Games Chromecast Customer Relationship Management Hacker SharePoint Slow User Smart Phones HIPAA Travel Legal Excel Regulations Administrator Keyboard ISP Teamwork Best Available Reputation Windows 8 3D Printing Presentation Access Politics Hiring/Firing Meetings Vendor Management Hosted Solution Scalability Science Cameras Experience Running Cable Phishing Computing Data Theft End of Support How To Robot Music Networking Prodcuctivity CloudSync Advertising Online Backup Near Field Communication Data storage Books Human Resources Programming Compliance PDF Uninterrupted Power Supply Black Market Electronic Medical Records Inbound Marketing Text Messaging Display HaaS Computer Accessories

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code