Contact us today!
(469) 567-0181
(903) 458-9400
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Can Computer Data Be Stolen Through Power Lines?

Can Computer Data Be Stolen Through Power Lines?

If you have an air-gapped computer, you probably think you're safe.  You may think that barring physical access to the machine, no hacker could possibly steal the data on that machine.  Unfortunately, you'd be incorrect.

Continue reading

1 In 5 Employees Going Rogue With Corporate Data

b2ap3 icon harkonnen hackers 400Companies around the world have reason to be worried about the use of cloud applications to share mission-critical information. In fact, 1 in 5 employees has uploaded proprietary corporate data to a cloud application, such as Dropbox or Google Docs, with the specific intent of sharing it outside of the company.

Continue reading

What is your Identity Worth to You?

b2ap3_thumbnail_identity.jpgYour identity has quite a lot of value, especially in the wrong hands. Security firm ZoneAlarm put together some numbers in 2011 concerning identity fraud, and it even shocked us. Let's talk about a few of these statistics and what it means.

Continue reading

Sign Up for Our Newsletter

Powered by ChronoForms -

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Microsoft Productivity Hackers Malware Google Business Software Business Computing Miscellaneous Workplace Tips Windows 10 Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing IT Support Communication User Tips Business Management VoIP Virtualization Server Smartphone Network Email Data Quick Tips Holiday Disaster Recovery Apps Alert Save Money Remote Computing Going Green Operating System Social Media Upgrade Business Continuity Mobile Device Management Office Saving Money Android Chrome Small Business Facebook Best Practice WiFi Identity Theft Employer-Employee Relationship Ransomware Antivirus The Internet of Things Big Data Managed Service Provider Mobility Microsoft Office Social Application Browser Current Events Government Saving Time Information Technology Spam Lithium-ion battery Bandwidth Printer Unified Threat Management Hacking Tablet BYOD Passwords Law Enforcement Office Tips Analytics History Gmail Search Password Money Wireless Data Management intranet Streaming Media Net Neutrality Firewall iPhone Education Collaboration Laptop User Error communications Work/Life Balance Computers Disaster Telephone Systems Humor Hard Drives Maintenance Avoiding Downtime Phone System Fraud Router Recovery Apple Network Security Automation Gadgets Smartphones Encryption Users USB Remote Monitoring Tech Support Marketing Budget Administration IT Consultant Fax Server Transportation Shortcut Business Intelligence Data Loss Managed IT Services Content Filtering Internet Exlporer Biometrics Point of Sale Wearable Technology PowerPoint Social Engineering Customer Service Cost Management Telephony Proactive IT Retail Virtual Reality BDR Wi-Fi Google Drive Online Currency Entertainment DDoS Flexibility Benefits Mobile Office Cybercrime IT Solutions Risk Management Office 365 Private Cloud VPN Managing Stress Wireless Technology Outlook Printer Server Update App Personal Information Access Emergency Presentation Meetings Compliance Science Programming Computing Hosted Solution Automobile Cleaning End of Support Running Cable Phishing Inbound Marketing Prodcuctivity Worker Commute Robot Save Time Emails Networking Audit Online Backup Advertising Video Games Twitter OneNote Data storage Hacker Human Resources Near Field Communication PDF Legal Display OneDrive Uninterrupted Power Supply Keyboard Bring Your Own Device Text Messaging Paperless Office Computer Accessories Internet of Things Politics Bloatware Workplace Applications Hiring/Firing IT consulting Miscelllaneous Mouse Artificial Intelligence Distributed Denial of Service Scalability Sports Experience Touchpad Branding Website HIPAA Network Congestion RAM eWaste How To Music Ebay Travel Operating Sysytem Regulations WIndows 7 Blogging Storage CPU ISP Amazon Television Files Books Two-factor Authentication 3D Printing Bluetooth Slow Smart Phones Trending Black Market Chromecast Electronic Medical Records Customer Relationship Management Cameras SharePoint HaaS User Windows 8 Data Theft Excel Instant Messaging Administrator Safety Reputation Teamwork Best Available Vendor Management CloudSync Battery

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...