Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Outsource Your IT to the Pros and Stop Doing IT the Hard Way

Outsource Your IT to the Pros and Stop Doing IT the Hard Way

How often does your technology experience trouble? If your business is constantly dealing with technical hiccups, your assets that are meant to be a boon to your organization, can quickly become a nuisance that holds you back. How can you take better care of your technology, and use it to usher in a new era of productivity?

Continue reading
0 Comments

4 Ways to Troubleshoot Network Performance Issues

b2ap3_thumbnail_rmm_it_400.jpgAre you experiencing performance issues with your computer network? Does it seem like it’s not running as effectively as it used to? Given the nature of technology, eventually, you’ll have to replace all of your computer hardware. But before you do, give your network a boost by trying these four IT maintenance best practices.

Continue reading
0 Comments

Tip of the Week: What to Look For and What to Avoid in a Consultant

b2ap3_thumbnail_consulting_tips_400.jpgSometimes you just don’t know what to do, and you don’t know where to turn for help. You don’t want to ask your competitors for anything, because they don’t need to know your weak points, and you feel crushed under the pressure of day-to-day operation. Maybe a hand once in a while isn’t such a bad thing.

Continue reading
0 Comments

Tip of the Week: How to Find the Right Outsourced IT Company for Your Business

b2ap3_thumbnail_your_outsourced_it_provider_400.jpgAs your company expands, you’re beginning to realize that one IT person isn’t enough to handle all of your technical needs. You feel like you need more hands on deck, but your budget won’t allow for it. You decide that your best option is to hire slowly and steadily, interviewing externally for the most qualified individuals. But, how can you be sure that they meet the needs of your company?

Continue reading
0 Comments

As Seen in Zoolander, Tech Support Miscommunication Can Be Frustrating

b2ap3_thumbnail_tech_support_miscommunication_400.jpgIT support is heavily reliant upon communication between both parties involved. Without both sides being on the same page, IT support miscommunications are far more likely to happen. Sometimes you just can’t help but laugh at poor communication skills, as seen in the 2001 movie Zoolander. But thankfully, these situations don’t arise too often in the non-fictional universe… right?

Continue reading
0 Comments

au·dit/ noun/: a systematic review or assessment of something

b2ap3_thumbnail_it_audit_400.jpgAre you confident that your company's network is 100 percent secure? The best way to answer "yes" to this question is with a network audit. This is a technical procedure where IT professionals analyze every nook and cranny of your system, looking for every possible vulnerability. No matter what the situation is with your company's IT management, a network audit is worth doing.

Continue reading
0 Comments

Even the White House Needs IT Services

b2ap3_thumbnail_white_house_needs_it_services_400.jpgA change is happening in the White House. Mikey Dickerson, a Google site reliability engineer, has just been appointed by the United States government as the deputy federal CIO, proving that even the big wigs need consulting from time-to-time.

Continue reading
0 Comments

How to Recognize a Champion IT Professional

b2ap3_thumbnail_technology_the_man_400.jpgWhen your business is in need of IT assistance, you want to make sure that you are getting the best of the best. However, the best course of action isn't to just look at someone's qualifications. You also want to look at their personality and other characteristics which can tell you a lot about who you are hiring.

Continue reading
0 Comments

Symantec Declares Antivirus “is dead”

 
b2ap3_thumbnail_antivirus_400.jpg
Some 25 years ago, Symantec, invented commercial antivirus software to protect computers from hackers.  Now they are telling us that such tactics are doomed to failure.  According to Symantec’s senior vice president, Brian Dye, antivirus “is dead”.  “We don’t think of antivirus as a moneymaker in any way.”  That’s a bold statement given the thousands of customers that shell out $50 or more per year for their Norton AntiVirus product.
Continue reading
0 Comments

Don’t Stoke the Flames – Build a Firewall

b2ap3_thumbnail_build_a_firewall_400.jpgIt's no secret that the Internet is full of dangerous activity. Too many people think their networks are safe without any kind of protection. We don't mean to say that the Internet isn't safe, but that it's only as safe as you make it for yourself. In order to keep your small business safe, you should implement protective software, like a firewall. A firewall can help keep your company safe from online threats, and believe us when we say that a little bit of protection goes a long way.

Continue reading
0 Comments

The Database Hack that Brought Down the Galactic Senate

b2ap3_thumbnail_star_wars_logo_400.jpgOn May 4th you may see more Star Wars T-shirts than normal. This is because May 4th is recognized around the galaxy as Star Wars Day (May the 4th be with you). Thanks to the abundant use of technology throughout this science fiction franchise, you can bet your podracer that we can find an IT lesson from Star Wars that can help your business!

Continue reading
0 Comments

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Business Software Business Computing Google Miscellaneous Windows 10 Workplace Tips Backup Efficiency Innovation Computer Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing Communication User Tips IT Support Business Management VoIP Email Holiday Server Network Data Quick Tips Virtualization Smartphone Office Going Green Business Continuity Mobile Device Management Saving Money Save Money Remote Computing Apps Disaster Recovery Alert Operating System Social Media Upgrade Android Small Business Chrome Microsoft Office Antivirus Social Facebook Mobility Application Best Practice The Internet of Things Employer-Employee Relationship WiFi Big Data Managed Service Provider Identity Theft Ransomware Lithium-ion battery Printer Analytics History Gmail Search Browser BYOD Current Events Government Law Enforcement Office Tips Password Information Technology Spam Bandwidth Unified Threat Management Hacking Tablet Saving Time Passwords Smartphones Hard Drives Maintenance Users USB Recovery Fraud Network Security Automation Streaming Media Education Encryption User Error Computers Disaster Remote Monitoring Wireless Data Management Tech Support Money Avoiding Downtime Phone System intranet Net Neutrality Router Firewall communications iPhone Laptop Work/Life Balance Apple Collaboration Telephone Systems Humor Gadgets Online Currency Benefits Outlook Printer Server Cybercrime Risk Management Office 365 Marketing Administration Managing Stress Private Cloud Wireless Technology VPN Content Filtering Update Point of Sale PowerPoint Personal Information Cost Management App Retail Budget BDR Entertainment Business Intelligence Transportation Shortcut Managed IT Services IT Consultant Fax Server Mobile Office Internet Exlporer Biometrics Data Loss Social Engineering Telephony Customer Service Wearable Technology Proactive IT IT Solutions Wi-Fi Virtual Reality Google Drive DDoS Flexibility Internet of Things Politics Bloatware IT consulting Applications Hiring/Firing Distributed Denial of Service Scalability Mouse Artificial Intelligence Sports Experience Cameras Data Theft Touchpad Branding eWaste How To Network Congestion Music CloudSync WIndows 7 Website Operating Sysytem RAM Television Storage Ebay Files Books Two-factor Authentication Bluetooth Compliance Amazon Programming Blogging CPU Trending Black Market Chromecast Electronic Medical Records Customer Relationship Management SharePoint HaaS Inbound Marketing User Smart Phones Slow Instant Messaging Emails Excel Audit Administrator Safety Teamwork Twitter Best Available OneNote Windows 8 Reputation Battery Presentation Access Emergency Meetings OneDrive Vendor Management Hosted Solution Automobile Science Bring Your Own Device Paperless Office Cleaning Running Cable Phishing Computing Workplace End of Support Worker Commute Miscelllaneous Robot Save Time Networking Video Games Prodcuctivity Advertising HIPAA Near Field Communication Data storage Hacker Online Backup Human Resources Legal Travel PDF Uninterrupted Power Supply Regulations ISP Keyboard Computer Accessories Display 3D Printing Text Messaging

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code