Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hacking Group Claims to Have Stolen NSA Cyber Weapons

Hacking Group Claims to Have Stolen NSA Cyber Weapons

Every security professional’s worst nightmare consists of the National Security Agency (NSA) being hacked. While there’s no proof that the NSA itself has been hacked, there is some evidence to suggest that some of the exploits used by the agency are up for grabs on the black market. What this means is that a lucky group of hackers could potentially get their hands on some very dangerous tools.

Continue reading
0 Comments

If a Teen Can Hack the CIA, Your Business Needs to Prioritize In Security

b2ap3_thumbnail_cia_hacked_400.jpgWe write about cyber security all of the time, and for good reason. You need to be sure that your organization’s defenses are bulletproof, or at least optimized for maximum security. A recent debacle in the United States serves as a reminder that even high-level, super-secret government accounts can be hacked, like this story from the Central Intelligence Agency (CIA).

Continue reading
0 Comments

Even the White House Needs IT Services

b2ap3_thumbnail_white_house_needs_it_services_400.jpgA change is happening in the White House. Mikey Dickerson, a Google site reliability engineer, has just been appointed by the United States government as the deputy federal CIO, proving that even the big wigs need consulting from time-to-time.

Continue reading
0 Comments

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Business Software Business Computing Google Miscellaneous Workplace Tips Windows 10 Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing IT Support User Tips Communication VoIP Business Management Server Network Smartphone Data Quick Tips Email Holiday Virtualization Alert Save Money Remote Computing Going Green Business Continuity Operating System Social Media Mobile Device Management Upgrade Saving Money Office Disaster Recovery Apps Android Chrome Small Business Application Facebook WiFi Best Practice Identity Theft Employer-Employee Relationship Mobility Antivirus Ransomware The Internet of Things Big Data Managed Service Provider Microsoft Office Social Search Gmail Password Browser Current Events Government Saving Time Lithium-ion battery Printer Information Technology Spam Bandwidth Unified Threat Management Hacking BYOD Tablet Passwords Law Enforcement History Office Tips Analytics intranet Net Neutrality Firewall iPhone Data Management Money Collaboration Laptop Streaming Media Education communications User Error Computers Hard Drives Disaster Maintenance Telephone Systems Humor Fraud Avoiding Downtime Phone System Router Recovery Apple Wireless Network Security Automation Encryption Gadgets Smartphones Users USB Work/Life Balance Remote Monitoring Tech Support IT Consultant Fax Server Flexibility Data Loss Marketing Budget Administration Business Intelligence Transportation Wearable Technology Shortcut Content Filtering Internet Exlporer Proactive IT Biometrics Point of Sale PowerPoint Social Engineering Telephony Online Currency Customer Service Office 365 Cost Management Retail Virtual Reality BDR Google Drive Entertainment DDoS Mobile Office Benefits Personal Information Cybercrime VPN IT Solutions Risk Management Managed IT Services Managing Stress Private Cloud Wireless Technology App Outlook Update Printer Server Wi-Fi Teamwork Keyboard Best Available Reputation Computing CloudSync Presentation Access Politics Meetings Hiring/Firing Prodcuctivity Hosted Solution Compliance Science Programming Scalability Online Backup Experience Running Cable Phishing End of Support Inbound Marketing How To Robot Emails Networking Audit Music Display Advertising Twitter OneNote Near Field Communication Data storage Human Resources Books PDF Uninterrupted Power Supply OneDrive Black Market Bring Your Own Device Electronic Medical Records Paperless Office Computer Accessories HaaS Text Messaging Internet of Things Bloatware Workplace Instant Messaging Website IT consulting RAM Applications Safety Distributed Denial of Service Miscelllaneous Ebay Mouse Artificial Intelligence Sports Battery Emergency Blogging CPU Touchpad Amazon Branding eWaste HIPAA Network Congestion Travel Automobile Cleaning WIndows 7 Slow Operating Sysytem Regulations Smart Phones Television Storage ISP 3D Printing Files Two-factor Authentication Worker Commute Save Time Windows 8 Bluetooth Trending Video Games Chromecast Customer Relationship Management Hacker Vendor Management User Cameras SharePoint Data Theft Excel Legal Administrator

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code