Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Can Computer Data Be Stolen Through Power Lines?

Can Computer Data Be Stolen Through Power Lines?

If you have an air-gapped computer, you probably think you're safe.  You may think that barring physical access to the machine, no hacker could possibly steal the data on that machine.  Unfortunately, you'd be incorrect.

Continue reading

1 In 5 Employees Going Rogue With Corporate Data

b2ap3 icon harkonnen hackers 400Companies around the world have reason to be worried about the use of cloud applications to share mission-critical information. In fact, 1 in 5 employees has uploaded proprietary corporate data to a cloud application, such as Dropbox or Google Docs, with the specific intent of sharing it outside of the company.

Continue reading

What is your Identity Worth to You?

b2ap3_thumbnail_identity.jpgYour identity has quite a lot of value, especially in the wrong hands. Security firm ZoneAlarm put together some numbers in 2011 concerning identity fraud, and it even shocked us. Let's talk about a few of these statistics and what it means.

Continue reading

Sign Up for Our Newsletter

Powered by ChronoForms -

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Microsoft Productivity Hackers Malware Business Computing Google Business Software Windows 10 Miscellaneous Workplace Tips Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware Mobile Devices Mobile Computing IT Services Health User Tips Communication IT Support VoIP Business Management Email Virtualization Holiday Server Network Data Quick Tips Smartphone Upgrade Disaster Recovery Office Apps Alert Going Green Save Money Remote Computing Business Continuity Mobile Device Management Operating System Saving Money Social Media Android Chrome Small Business Big Data Ransomware Managed Service Provider Microsoft Office Social WiFi Facebook Mobility Identity Theft Application Antivirus Best Practice The Internet of Things Employer-Employee Relationship Passwords Analytics History Search Gmail Saving Time Browser Current Events Law Enforcement Government Lithium-ion battery Office Tips Printer Password Information Technology Spam BYOD Bandwidth Unified Threat Management Hacking Tablet Humor Remote Monitoring Tech Support Gadgets Smartphones Recovery USB Users intranet Network Security Firewall Automation Net Neutrality iPhone Collaboration Laptop Streaming Media Education Maintenance Hard Drives User Error Fraud Data Management Computers Disaster Money Wireless Avoiding Downtime Phone System communications Work/Life Balance Router Apple Encryption Telephone Systems Google Drive IT Solutions App DDoS Flexibility Benefits IT Consultant Fax Server Outlook Cybercrime Data Loss Printer Server Risk Management Office 365 Wearable Technology Private Cloud Managing Stress Marketing Wireless Technology Administration Proactive IT Update Content Filtering Online Currency Point of Sale Personal Information PowerPoint Cost Management Budget Retail BDR Transportation Shortcut Business Intelligence Entertainment Managed IT Services Internet Exlporer Biometrics Social Engineering Mobile Office Telephony Customer Service VPN Wi-Fi Virtual Reality Windows 8 Keyboard Travel Computer Accessories Regulations Text Messaging Internet of Things Politics Bloatware ISP Vendor Management 3D Printing Applications Hiring/Firing IT consulting Mouse Artificial Intelligence Distributed Denial of Service Scalability Sports Experience Computing Touchpad Branding Network Congestion Cameras eWaste How To Music Data Theft Prodcuctivity Operating Sysytem WIndows 7 Storage Television Files Books Online Backup Two-factor Authentication CloudSync Bluetooth Black Market Trending Chromecast Electronic Medical Records Customer Relationship Management Compliance Programming Display SharePoint HaaS User Instant Messaging Excel Administrator Safety Inbound Marketing Best Available Emails Audit Reputation Teamwork Battery OneNote Access Emergency Presentation Twitter Meetings Hosted Solution Automobile Science OneDrive Website Cleaning RAM Phishing Bring Your Own Device Ebay End of Support Running Cable Worker Commute Paperless Office Amazon Workplace Blogging Robot Save Time CPU Networking Advertising Video Games Miscelllaneous Smart Phones Data storage Hacker Slow Human Resources Near Field Communication PDF Legal Uninterrupted Power Supply HIPAA

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...