Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Can Computer Data Be Stolen Through Power Lines?

Can Computer Data Be Stolen Through Power Lines?

If you have an air-gapped computer, you probably think you're safe.  You may think that barring physical access to the machine, no hacker could possibly steal the data on that machine.  Unfortunately, you'd be incorrect.

Continue reading

1 In 5 Employees Going Rogue With Corporate Data

b2ap3 icon harkonnen hackers 400Companies around the world have reason to be worried about the use of cloud applications to share mission-critical information. In fact, 1 in 5 employees has uploaded proprietary corporate data to a cloud application, such as Dropbox or Google Docs, with the specific intent of sharing it outside of the company.

Continue reading

What is your Identity Worth to You?

b2ap3_thumbnail_identity.jpgYour identity has quite a lot of value, especially in the wrong hands. Security firm ZoneAlarm put together some numbers in 2011 concerning identity fraud, and it even shocked us. Let's talk about a few of these statistics and what it means.

Continue reading

Sign Up for Our Newsletter

Powered by ChronoForms -

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Security Tip of the Week Technology Privacy Best Practices Cloud Internet Microsoft Productivity Hackers Malware Business Computing Google Business Software Windows 10 Miscellaneous Workplace Tips Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware Mobile Computing IT Services Health Mobile Devices IT Support Communication User Tips VoIP Business Management Virtualization Server Network Smartphone Data Quick Tips Email Holiday Apps Disaster Recovery Alert Save Money Remote Computing Going Green Operating System Business Continuity Social Media Upgrade Mobile Device Management Office Saving Money Android Chrome Small Business Ransomware Social Facebook Mobility WiFi Identity Theft Antivirus Application The Internet of Things Big Data Best Practice Managed Service Provider Microsoft Office Employer-Employee Relationship Analytics History Search Gmail Browser Current Events Government Saving Time Lithium-ion battery Information Technology Law Enforcement Spam Printer Office Tips Bandwidth Unified Threat Management Password Hacking Tablet BYOD Passwords Remote Monitoring Humor Tech Support intranet Recovery Net Neutrality Firewall Streaming Media Network Security iPhone Collaboration Automation Laptop Education User Error Disaster Wireless Computers Hard Drives Maintenance Fraud Avoiding Downtime Phone System Work/Life Balance Router Money Data Management Apple communications Gadgets Smartphones Encryption USB Users Telephone Systems Google Drive Printer Server DDoS Office 365 Benefits Fax Server Marketing IT Consultant Administration Data Loss Cybercrime Content Filtering Wearable Technology Risk Management Personal Information Point of Sale Proactive IT PowerPoint Cost Management Private Cloud Managing Stress Wireless Technology Online Currency Retail BDR Managed IT Services Entertainment Update Mobile Office Budget Transportation Shortcut Wi-Fi Business Intelligence Internet Exlporer Flexibility IT Solutions VPN Biometrics Social Engineering Telephony Customer Service Virtual Reality App Outlook Data Theft Music Computer Accessories Text Messaging Vendor Management Internet of Things Bloatware Applications CloudSync Books IT consulting Mouse Artificial Intelligence Computing Distributed Denial of Service Sports Black Market Touchpad Compliance Branding Electronic Medical Records Programming Network Congestion HaaS Prodcuctivity eWaste Instant Messaging Operating Sysytem Inbound Marketing Safety WIndows 7 Online Backup Audit Storage Emails Television Files Two-factor Authentication Battery Twitter Bluetooth Emergency OneNote Trending Display Chromecast Customer Relationship Management Automobile SharePoint Cleaning OneDrive User Bring Your Own Device Excel Administrator Paperless Office Worker Commute Reputation Teamwork Save Time Workplace Best Available Video Games Access Miscelllaneous Presentation RAM Meetings Website Hacker Hosted Solution Ebay Science Legal HIPAA Phishing CPU End of Support Amazon Travel Running Cable Blogging Keyboard Regulations Robot Networking Politics ISP Slow 3D Printing Advertising Smart Phones Hiring/Firing Scalability Data storage Human Resources Experience Near Field Communication PDF Windows 8 Cameras Uninterrupted Power Supply How To

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...