Contact us today!
(469) 567-0181
(903) 458-9400
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Can Computer Data Be Stolen Through Power Lines?

Can Computer Data Be Stolen Through Power Lines?

If you have an air-gapped computer, you probably think you're safe.  You may think that barring physical access to the machine, no hacker could possibly steal the data on that machine.  Unfortunately, you'd be incorrect.

Continue reading

Alert: Even Chip-Based Cards Can’t Protect You From This New ATM Scam

Alert: Even Chip-Based Cards Can’t Protect You From This New ATM Scam

If we told you that automated teller machines, or ATMs, were susceptible to hacking attacks, would you believe us? You should; there are a plethora of ways for hackers to infiltrate and steal money from ATMs, with the latest being so dangerous that even the Secret Service has issued warnings about it.

Continue reading
0 Comments

Hackers Lay Claim to 4½ Million Medical Records

stethoscope keyboardIf 2014 hasn't been a legendary year for data breaches yet, it certainly is now. Community Health Systems, a hospital network for over 206 facilities across the United States, has been the target of a data breach resulting in 4.5 million records being compromised by Chinese hackers, including Social Security numbers, birthdays, names, addresses, and telephone numbers.

Continue reading
0 Comments

Symantec Declares Antivirus “is dead”

 
b2ap3_thumbnail_antivirus_400.jpg
Some 25 years ago, Symantec, invented commercial antivirus software to protect computers from hackers.  Now they are telling us that such tactics are doomed to failure.  According to Symantec’s senior vice president, Brian Dye, antivirus “is dead”.  “We don’t think of antivirus as a moneymaker in any way.”  That’s a bold statement given the thousands of customers that shell out $50 or more per year for their Norton AntiVirus product.
Recent comment in this post
Summer Champion
Symantec hs some power of the declaration over the antivirus that was going to end this month along with all facts. I used to have... Read More
Monday, 04 November 2019 23:48
Continue reading
1 Comment

What is your Identity Worth to You?

b2ap3_thumbnail_identity.jpgYour identity has quite a lot of value, especially in the wrong hands. Security firm ZoneAlarm put together some numbers in 2011 concerning identity fraud, and it even shocked us. Let's talk about a few of these statistics and what it means.

Continue reading
0 Comments

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Business Software Business Computing Google Miscellaneous Workplace Tips Windows 10 Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing IT Support Communication User Tips Business Management VoIP Smartphone Server Email Network Holiday Data Quick Tips Virtualization Remote Computing Operating System Social Media Upgrade Going Green Office Business Continuity Mobile Device Management Saving Money Disaster Recovery Apps Save Money Alert Chrome Small Business Android WiFi Mobility Identity Theft The Internet of Things Big Data Application Antivirus Managed Service Provider Microsoft Office Best Practice Social Facebook Employer-Employee Relationship Ransomware Information Technology Spam Bandwidth Saving Time Unified Threat Management Law Enforcement Hacking Tablet Lithium-ion battery Office Tips Printer Password Passwords BYOD Analytics History Search Gmail Browser Current Events Government Firewall Net Neutrality Automation iPhone Collaboration Laptop Avoiding Downtime Phone System Router Apple Maintenance Hard Drives Fraud Money Gadgets Wireless Data Management Smartphones Users USB communications Work/Life Balance Telephone Systems Encryption Humor Streaming Media Remote Monitoring Tech Support Education User Error Recovery Computers Network Security Disaster intranet Data Loss Retail Cybercrime Risk Management BDR Entertainment Office 365 Wearable Technology Private Cloud Managing Stress Proactive IT Mobile Office Wireless Technology Update Online Currency Personal Information IT Solutions Budget Shortcut Business Intelligence Transportation Managed IT Services Internet Exlporer Outlook Printer Server Biometrics Social Engineering Telephony VPN Customer Service Marketing Administration Wi-Fi Virtual Reality Google Drive DDoS Flexibility App Content Filtering Benefits Point of Sale PowerPoint IT Consultant Cost Management Fax Server Music Prodcuctivity OneDrive WIndows 7 Operating Sysytem Bring Your Own Device Television Storage Online Backup Paperless Office Files Books Two-factor Authentication Workplace Bluetooth Trending Black Market Customer Relationship Management Miscelllaneous Chromecast Electronic Medical Records SharePoint HaaS Display User Instant Messaging Excel HIPAA Administrator Safety Travel Reputation Teamwork Best Available Regulations Battery ISP Presentation Access Emergency Meetings 3D Printing Hosted Solution Automobile Science Website RAM Cleaning End of Support Running Cable Ebay Phishing Cameras Worker Commute Networking Blogging CPU Data Theft Robot Save Time Amazon Advertising Video Games Human Resources Near Field Communication Slow CloudSync Data storage Hacker Smart Phones PDF Legal Uninterrupted Power Supply Programming Windows 8 Compliance Keyboard Text Messaging Computer Accessories Internet of Things Politics Bloatware Vendor Management IT consulting Inbound Marketing Applications Hiring/Firing Emails Artificial Intelligence Audit Distributed Denial of Service Scalability Mouse Sports Experience Computing OneNote Branding Twitter Touchpad eWaste How To Network Congestion

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code