Contact us today!
(469) 567-0181
(903) 458-9400
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hacking Group Claims to Have Stolen NSA Cyber Weapons

Hacking Group Claims to Have Stolen NSA Cyber Weapons

Every security professional’s worst nightmare consists of the National Security Agency (NSA) being hacked. While there’s no proof that the NSA itself has been hacked, there is some evidence to suggest that some of the exploits used by the agency are up for grabs on the black market. What this means is that a lucky group of hackers could potentially get their hands on some very dangerous tools.

Continue reading
0 Comments

If a Teen Can Hack the CIA, Your Business Needs to Prioritize In Security

b2ap3_thumbnail_cia_hacked_400.jpgWe write about cyber security all of the time, and for good reason. You need to be sure that your organization’s defenses are bulletproof, or at least optimized for maximum security. A recent debacle in the United States serves as a reminder that even high-level, super-secret government accounts can be hacked, like this story from the Central Intelligence Agency (CIA).

Continue reading
0 Comments

Even the White House Needs IT Services

b2ap3_thumbnail_white_house_needs_it_services_400.jpgA change is happening in the White House. Mikey Dickerson, a Google site reliability engineer, has just been appointed by the United States government as the deputy federal CIO, proving that even the big wigs need consulting from time-to-time.

Continue reading
0 Comments

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Business Software Business Computing Google Miscellaneous Workplace Tips Windows 10 Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing IT Support User Tips Communication VoIP Business Management Holiday Server Network Data Quick Tips Smartphone Email Virtualization Alert Going Green Save Money Remote Computing Business Continuity Mobile Device Management Operating System Social Media Saving Money Upgrade Office Apps Disaster Recovery Android Chrome Small Business Mobility Social WiFi Facebook Identity Theft Application Antivirus Best Practice Employer-Employee Relationship Ransomware The Internet of Things Big Data Managed Service Provider Microsoft Office Analytics History Gmail Search Law Enforcement Saving Time Browser Office Tips Password Current Events Government Lithium-ion battery Printer Information Technology Spam Bandwidth BYOD Unified Threat Management Hacking Tablet Passwords Users USB intranet Net Neutrality Firewall iPhone Collaboration Laptop Streaming Media Money Hard Drives Education Wireless Maintenance Data Management User Error Fraud Computers Disaster communications Work/Life Balance Telephone Systems Avoiding Downtime Phone System Router Humor Encryption Apple Recovery Remote Monitoring Network Security Tech Support Gadgets Automation Smartphones Fax Server Office 365 IT Consultant Outlook Private Cloud Printer Server Managing Stress Data Loss Wireless Technology Wearable Technology Marketing Update Proactive IT Administration Personal Information Content Filtering Online Currency Budget Point of Sale PowerPoint Transportation Shortcut Business Intelligence Managed IT Services Cost Management Internet Exlporer Retail Biometrics BDR Social Engineering Customer Service Entertainment Telephony Mobile Office Virtual Reality Wi-Fi Google Drive VPN DDoS Flexibility Benefits IT Solutions App Cybercrime Risk Management Storage Computing Television Files Books Two-factor Authentication Cameras Data Theft Bluetooth Prodcuctivity Trending Black Market Chromecast Electronic Medical Records Customer Relationship Management CloudSync SharePoint HaaS User Online Backup Excel Instant Messaging Administrator Safety Compliance Reputation Programming Teamwork Best Available Battery Display Access Emergency Presentation Inbound Marketing Meetings Science Emails Audit Hosted Solution Automobile Cleaning Twitter End of Support OneNote Running Cable Phishing Worker Commute Robot Save Time Networking RAM Advertising OneDrive Video Games Website Ebay Bring Your Own Device Paperless Office Data storage Hacker Human Resources Near Field Communication CPU PDF Amazon Workplace Legal Blogging Uninterrupted Power Supply Miscelllaneous Keyboard Slow Text Messaging Smart Phones Computer Accessories Politics Bloatware Internet of Things HIPAA Applications Hiring/Firing IT consulting Travel Artificial Intelligence Distributed Denial of Service Scalability Windows 8 Mouse Sports Experience Regulations Touchpad ISP Branding Network Congestion eWaste How To Vendor Management 3D Printing Music Operating Sysytem WIndows 7

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code