Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Lessons From a Company that Successfully Beat Ransomware

Lessons From a Company that Successfully Beat Ransomware

Ransomware is a dangerous malware that all businesses fear. Although, if the right precautions are taken, a ransomware attack can be completely thwarted. A recent hack attack of the San Francisco Municipal Transportation Agency provides us with a real-world example of this, which helps make ransomware appear a lot less formidable.

Continue reading
0 Comments

Baseball Executive Found Guilty of “Performance Enhancing Hack Attack”

b2ap3_thumbnail_baseball_hacks_brings_concerns_400.jpgA very large shift has taken place in the annals of baseball. The “Moneyball” revolution has produced a dependence on analytics, both for measuring individual player performance and for overall team makeup. This shift has now presented at least one Major League Baseball franchise with major data security questions.

Continue reading
0 Comments

Tip of the Week: How to Spot a DDoS Attack

b2ap3_thumbnail_ddos_400.jpgIf you are a technician and a network you are responsible for begins to go down because the traffic that is coming into the network is unusually high, there is a good chance you are experiencing a distributed denial of service attack, or DDoS. These attacks, which are extraordinarily difficult to prevent altogether, can be exceedingly costly for a business.

Continue reading
0 Comments

Cyberattacks Can Have Physical Consequences

b2ap3_thumbnail_physical_problems_for_hacks_400.jpgBusiness owners primarily concentrate more on the digital effects of hacking rather than the physical side of it. After all, hacking some code through a network can’t harm you or anybody else in the real world, right? Wrong. As shown by a recent hack in Germany, ignoring network security can be a dangerous gambit.

Continue reading
0 Comments

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Microsoft Productivity Hackers Malware Software Business Computing Google Business Windows 10 Miscellaneous Workplace Tips Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware Mobile Devices Mobile Computing IT Services Health User Tips Communication IT Support VoIP Business Management Smartphone Virtualization Email Holiday Server Network Data Quick Tips Remote Computing Saving Money Operating System Apps Disaster Recovery Social Media Upgrade Alert Office Going Green Business Continuity Save Money Mobile Device Management Chrome Android Small Business Employer-Employee Relationship Ransomware The Internet of Things Big Data Managed Service Provider Mobility Microsoft Office WiFi Identity Theft Social Facebook Antivirus Application Best Practice Bandwidth Unified Threat Management Hacking Tablet Passwords Saving Time Analytics History Lithium-ion battery Search Gmail Law Enforcement Printer Browser Office Tips Password Current Events Government BYOD Information Technology Spam Encryption Telephone Systems Avoiding Downtime Phone System Humor Remote Monitoring Router Tech Support Apple Recovery intranet Net Neutrality Firewall Gadgets iPhone Network Security Laptop Smartphones Automation Collaboration USB Users Hard Drives Maintenance Wireless Fraud Streaming Media Data Management Money Education User Error Work/Life Balance Computers Disaster communications Entertainment Telephony Customer Service Flexibility App Mobile Office Virtual Reality Google Drive DDoS Benefits IT Consultant Fax Server IT Solutions Office 365 Data Loss Cybercrime Wearable Technology Risk Management Outlook Proactive IT Managing Stress Private Cloud Printer Server Wireless Technology Personal Information Online Currency Update Marketing Administration Managed IT Services Content Filtering Budget Point of Sale PowerPoint Transportation Shortcut Business Intelligence Cost Management Internet Exlporer Retail VPN Biometrics BDR Social Engineering Wi-Fi Bring Your Own Device Keyboard Near Field Communication Paperless Office Data storage Human Resources Workplace Politics Windows 8 PDF Uninterrupted Power Supply Hiring/Firing Scalability Miscelllaneous Computer Accessories Experience Vendor Management Text Messaging Internet of Things Bloatware IT consulting How To HIPAA Applications Distributed Denial of Service Computing Mouse Music Travel Artificial Intelligence Regulations Sports Touchpad ISP Branding eWaste Prodcuctivity 3D Printing Network Congestion Books WIndows 7 Black Market Online Backup Operating Sysytem Television Storage Electronic Medical Records HaaS Cameras Files Two-factor Authentication Instant Messaging Data Theft Bluetooth Trending Safety Display Chromecast Customer Relationship Management User Battery CloudSync SharePoint Excel Emergency Administrator Best Available Automobile Compliance Reputation Programming Teamwork Cleaning Access Presentation Worker Commute Website RAM Inbound Marketing Meetings Audit Hosted Solution Science Save Time Ebay Emails Video Games Amazon Phishing Blogging CPU Twitter End of Support OneNote Running Cable Hacker Legal Robot Networking OneDrive Smart Phones Slow Advertising

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code