Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hacking Group Claims to Have Stolen NSA Cyber Weapons

Hacking Group Claims to Have Stolen NSA Cyber Weapons

Every security professional’s worst nightmare consists of the National Security Agency (NSA) being hacked. While there’s no proof that the NSA itself has been hacked, there is some evidence to suggest that some of the exploits used by the agency are up for grabs on the black market. What this means is that a lucky group of hackers could potentially get their hands on some very dangerous tools.

Continue reading
0 Comments

If a Teen Can Hack the CIA, Your Business Needs to Prioritize In Security

b2ap3_thumbnail_cia_hacked_400.jpgWe write about cyber security all of the time, and for good reason. You need to be sure that your organization’s defenses are bulletproof, or at least optimized for maximum security. A recent debacle in the United States serves as a reminder that even high-level, super-secret government accounts can be hacked, like this story from the Central Intelligence Agency (CIA).

Continue reading
0 Comments

Even the White House Needs IT Services

b2ap3_thumbnail_white_house_needs_it_services_400.jpgA change is happening in the White House. Mikey Dickerson, a Google site reliability engineer, has just been appointed by the United States government as the deputy federal CIO, proving that even the big wigs need consulting from time-to-time.

Continue reading
0 Comments

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Business Software Business Computing Google Windows 10 Miscellaneous Workplace Tips Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing IT Support User Tips Communication VoIP Business Management Holiday Server Network Data Quick Tips Smartphone Virtualization Email Going Green Save Money Business Continuity Remote Computing Mobile Device Management Operating System Saving Money Social Media Upgrade Disaster Recovery Apps Office Alert Android Chrome Small Business Ransomware Social WiFi Identity Theft Facebook Mobility Antivirus Application The Internet of Things Best Practice Big Data Managed Service Provider Microsoft Office Employer-Employee Relationship History Analytics Search Saving Time Gmail Browser Lithium-ion battery Current Events Printer Government Law Enforcement Information Technology Spam Office Tips BYOD Password Bandwidth Unified Threat Management Hacking Tablet Passwords Humor Net Neutrality Users Firewall USB iPhone Collaboration Laptop Recovery Network Security Automation Hard Drives Maintenance Streaming Media Education Fraud User Error Computers Disaster Wireless Avoiding Downtime Data Management Money Phone System Encryption Router Apple Work/Life Balance Remote Monitoring communications Tech Support Gadgets Telephone Systems Smartphones intranet Data Loss Google Drive DDoS Outlook Printer Server Wearable Technology Benefits Proactive IT Office 365 Marketing Administration Cybercrime Online Currency Risk Management Content Filtering Managing Stress Point of Sale Private Cloud PowerPoint Wireless Technology Personal Information Cost Management Update Retail BDR Entertainment Managed IT Services VPN Budget Mobile Office Transportation Shortcut Business Intelligence Internet Exlporer App Biometrics Social Engineering IT Solutions Wi-Fi Telephony Customer Service Flexibility IT Consultant Fax Server Virtual Reality Scalability Computer Accessories Experience Text Messaging Prodcuctivity Cameras Internet of Things Data Theft Bloatware IT consulting Online Backup How To Applications Distributed Denial of Service Mouse Music Artificial Intelligence Sports CloudSync Touchpad Branding eWaste Display Network Congestion Books Compliance Programming WIndows 7 Black Market Operating Sysytem Television Storage Electronic Medical Records HaaS Files Inbound Marketing Two-factor Authentication Instant Messaging Emails Bluetooth Audit Trending Safety Chromecast Twitter Customer Relationship Management OneNote User RAM Battery SharePoint Website Ebay Excel Emergency Administrator OneDrive Best Available CPU Automobile Reputation Amazon Teamwork Blogging Bring Your Own Device Paperless Office Cleaning Access Workplace Presentation Slow Worker Commute Smart Phones Meetings Hosted Solution Miscelllaneous Science Save Time Video Games Running Cable Windows 8 Phishing End of Support HIPAA Hacker Legal Robot Travel Networking Vendor Management Advertising Regulations ISP Keyboard Near Field Communication 3D Printing Data storage Human Resources Politics PDF Computing Uninterrupted Power Supply Hiring/Firing

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code