Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hacking Group Claims to Have Stolen NSA Cyber Weapons

Hacking Group Claims to Have Stolen NSA Cyber Weapons

Every security professional’s worst nightmare consists of the National Security Agency (NSA) being hacked. While there’s no proof that the NSA itself has been hacked, there is some evidence to suggest that some of the exploits used by the agency are up for grabs on the black market. What this means is that a lucky group of hackers could potentially get their hands on some very dangerous tools.

Continue reading
0 Comments

If a Teen Can Hack the CIA, Your Business Needs to Prioritize In Security

b2ap3_thumbnail_cia_hacked_400.jpgWe write about cyber security all of the time, and for good reason. You need to be sure that your organization’s defenses are bulletproof, or at least optimized for maximum security. A recent debacle in the United States serves as a reminder that even high-level, super-secret government accounts can be hacked, like this story from the Central Intelligence Agency (CIA).

Continue reading
0 Comments

Even the White House Needs IT Services

b2ap3_thumbnail_white_house_needs_it_services_400.jpgA change is happening in the White House. Mikey Dickerson, a Google site reliability engineer, has just been appointed by the United States government as the deputy federal CIO, proving that even the big wigs need consulting from time-to-time.

Continue reading
0 Comments

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Business Software Business Computing Google Workplace Tips Windows 10 Miscellaneous Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing Communication User Tips IT Support VoIP Business Management Server Email Holiday Network Data Quick Tips Virtualization Smartphone Office Going Green Business Continuity Mobile Device Management Saving Money Apps Save Money Disaster Recovery Alert Remote Computing Operating System Social Media Upgrade Small Business Android Chrome Microsoft Office Antivirus Social Facebook Application Mobility Best Practice WiFi The Internet of Things Identity Theft Big Data Employer-Employee Relationship Managed Service Provider Ransomware Analytics BYOD History Search Gmail Browser Current Events Government Law Enforcement Office Tips Password Information Technology Spam Bandwidth Unified Threat Management Saving Time Hacking Tablet Lithium-ion battery Printer Passwords Smartphones Fraud Users USB Work/Life Balance Recovery Network Security Automation Encryption Streaming Media Education Remote Monitoring Tech Support User Error Computers Disaster intranet Data Management Money Net Neutrality Firewall iPhone Collaboration Laptop Avoiding Downtime Phone System Router communications Apple Wireless Telephone Systems Hard Drives Maintenance Humor Gadgets Benefits Outlook Printer Server Wi-Fi Cybercrime Flexibility Risk Management Marketing VPN Administration Managing Stress Private Cloud Wireless Technology Content Filtering App Update Point of Sale PowerPoint Office 365 Cost Management Fax Server Retail IT Consultant Budget BDR Entertainment Data Loss Business Intelligence Transportation Shortcut Wearable Technology Internet Exlporer Mobile Office Biometrics Personal Information Proactive IT Social Engineering Telephony Customer Service Online Currency Virtual Reality IT Solutions Managed IT Services Google Drive DDoS Internet of Things Bloatware Save Time IT consulting Video Games Applications Distributed Denial of Service Mouse Artificial Intelligence Cameras Sports Website Hacker RAM Legal Touchpad Data Theft Ebay Branding eWaste Network Congestion Amazon Blogging Keyboard CPU WIndows 7 Operating Sysytem CloudSync Television Storage Politics Smart Phones Files Two-factor Authentication Hiring/Firing Slow Programming Scalability Compliance Bluetooth Trending Experience Chromecast Windows 8 Customer Relationship Management SharePoint User How To Inbound Marketing Emails Audit Excel Music Administrator Vendor Management Teamwork OneNote Best Available Reputation Twitter Books Presentation Computing Access Meetings OneDrive Black Market Hosted Solution Bring Your Own Device Science Electronic Medical Records HaaS Prodcuctivity Paperless Office Running Cable Workplace Phishing Instant Messaging End of Support Safety Online Backup Robot Miscelllaneous Networking Battery Advertising Emergency Near Field Communication Data storage HIPAA Display Human Resources Travel Automobile PDF Regulations Uninterrupted Power Supply Cleaning ISP Computer Accessories Worker Commute 3D Printing Text Messaging

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code