Contact us today!
(469) 567-0181
(903) 458-9400
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hacking Group Claims to Have Stolen NSA Cyber Weapons

Hacking Group Claims to Have Stolen NSA Cyber Weapons

Every security professional’s worst nightmare consists of the National Security Agency (NSA) being hacked. While there’s no proof that the NSA itself has been hacked, there is some evidence to suggest that some of the exploits used by the agency are up for grabs on the black market. What this means is that a lucky group of hackers could potentially get their hands on some very dangerous tools.

Continue reading
0 Comments

If a Teen Can Hack the CIA, Your Business Needs to Prioritize In Security

b2ap3_thumbnail_cia_hacked_400.jpgWe write about cyber security all of the time, and for good reason. You need to be sure that your organization’s defenses are bulletproof, or at least optimized for maximum security. A recent debacle in the United States serves as a reminder that even high-level, super-secret government accounts can be hacked, like this story from the Central Intelligence Agency (CIA).

Continue reading
0 Comments

Even the White House Needs IT Services

b2ap3_thumbnail_white_house_needs_it_services_400.jpgA change is happening in the White House. Mikey Dickerson, a Google site reliability engineer, has just been appointed by the United States government as the deputy federal CIO, proving that even the big wigs need consulting from time-to-time.

Continue reading
0 Comments

Sign Up for Our Newsletter

captcharefresh

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Business Software Business Computing Google Miscellaneous Workplace Tips Windows 10 Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing IT Support User Tips Communication VoIP Business Management Server Network Data Quick Tips Smartphone Email Virtualization Holiday Going Green Save Money Remote Computing Business Continuity Mobile Device Management Operating System Saving Money Social Media Upgrade Disaster Recovery Office Apps Alert Android Chrome Small Business Social WiFi Facebook Application Identity Theft Best Practice Antivirus Employer-Employee Relationship Ransomware The Internet of Things Big Data Managed Service Provider Microsoft Office Mobility Analytics History Law Enforcement Search Gmail Office Tips Saving Time Password Browser Current Events Government Lithium-ion battery Printer Information Technology Spam Bandwidth BYOD Unified Threat Management Hacking Tablet Passwords iPhone Collaboration Laptop Streaming Media Data Management Money Wireless Maintenance Hard Drives Education User Error Fraud Disaster Computers communications Work/Life Balance Telephone Systems Avoiding Downtime Humor Phone System Router Apple Encryption Recovery Network Security Automation Remote Monitoring Gadgets Tech Support Smartphones USB Users intranet Firewall Net Neutrality Update Wearable Technology Marketing Personal Information Administration Proactive IT Budget Content Filtering Online Currency Transportation Shortcut Business Intelligence Point of Sale Managed IT Services Internet Exlporer PowerPoint Cost Management Biometrics Social Engineering Telephony Retail Customer Service BDR Entertainment Wi-Fi Virtual Reality Google Drive DDoS Flexibility Mobile Office VPN Benefits IT Solutions App Cybercrime Risk Management Office 365 Managing Stress IT Consultant Fax Server Private Cloud Wireless Technology Outlook Data Loss Printer Server Prodcuctivity User SharePoint HaaS Instant Messaging Excel Online Backup Administrator Safety CloudSync Best Available Reputation Teamwork Battery Access Emergency Compliance Programming Presentation Display Meetings Hosted Solution Automobile Science Cleaning Inbound Marketing Audit Phishing End of Support Emails Running Cable Worker Commute Robot Save Time Twitter Networking OneNote Advertising Video Games Website RAM Data storage Hacker Human Resources OneDrive Near Field Communication Bring Your Own Device Ebay PDF Legal Uninterrupted Power Supply Paperless Office Blogging CPU Keyboard Amazon Workplace Computer Accessories Text Messaging Internet of Things Politics Miscelllaneous Bloatware IT consulting Slow Applications Hiring/Firing Smart Phones Distributed Denial of Service Scalability Mouse Artificial Intelligence Sports Experience HIPAA Windows 8 Touchpad Travel Branding Regulations eWaste How To Network Congestion Music ISP WIndows 7 Vendor Management 3D Printing Operating Sysytem Television Storage Files Books Two-factor Authentication Computing Bluetooth Cameras Trending Black Market Chromecast Electronic Medical Records Data Theft Customer Relationship Management

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code