Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Outsource Your IT to the Pros and Stop Doing IT the Hard Way

Outsource Your IT to the Pros and Stop Doing IT the Hard Way

How often does your technology experience trouble? If your business is constantly dealing with technical hiccups, your assets that are meant to be a boon to your organization, can quickly become a nuisance that holds you back. How can you take better care of your technology, and use it to usher in a new era of productivity?

Continue reading
0 Comments

4 Ways to Troubleshoot Network Performance Issues

b2ap3_thumbnail_rmm_it_400.jpgAre you experiencing performance issues with your computer network? Does it seem like it’s not running as effectively as it used to? Given the nature of technology, eventually, you’ll have to replace all of your computer hardware. But before you do, give your network a boost by trying these four IT maintenance best practices.

Continue reading
0 Comments

Tip of the Week: What to Look For and What to Avoid in a Consultant

b2ap3_thumbnail_consulting_tips_400.jpgSometimes you just don’t know what to do, and you don’t know where to turn for help. You don’t want to ask your competitors for anything, because they don’t need to know your weak points, and you feel crushed under the pressure of day-to-day operation. Maybe a hand once in a while isn’t such a bad thing.

Continue reading
0 Comments

Tip of the Week: How to Find the Right Outsourced IT Company for Your Business

b2ap3_thumbnail_your_outsourced_it_provider_400.jpgAs your company expands, you’re beginning to realize that one IT person isn’t enough to handle all of your technical needs. You feel like you need more hands on deck, but your budget won’t allow for it. You decide that your best option is to hire slowly and steadily, interviewing externally for the most qualified individuals. But, how can you be sure that they meet the needs of your company?

Continue reading
0 Comments

As Seen in Zoolander, Tech Support Miscommunication Can Be Frustrating

b2ap3_thumbnail_tech_support_miscommunication_400.jpgIT support is heavily reliant upon communication between both parties involved. Without both sides being on the same page, IT support miscommunications are far more likely to happen. Sometimes you just can’t help but laugh at poor communication skills, as seen in the 2001 movie Zoolander. But thankfully, these situations don’t arise too often in the non-fictional universe… right?

Continue reading
0 Comments

au·dit/ noun/: a systematic review or assessment of something

b2ap3_thumbnail_it_audit_400.jpgAre you confident that your company's network is 100 percent secure? The best way to answer "yes" to this question is with a network audit. This is a technical procedure where IT professionals analyze every nook and cranny of your system, looking for every possible vulnerability. No matter what the situation is with your company's IT management, a network audit is worth doing.

Continue reading
0 Comments

Even the White House Needs IT Services

b2ap3_thumbnail_white_house_needs_it_services_400.jpgA change is happening in the White House. Mikey Dickerson, a Google site reliability engineer, has just been appointed by the United States government as the deputy federal CIO, proving that even the big wigs need consulting from time-to-time.

Continue reading
0 Comments

How to Recognize a Champion IT Professional

b2ap3_thumbnail_technology_the_man_400.jpgWhen your business is in need of IT assistance, you want to make sure that you are getting the best of the best. However, the best course of action isn't to just look at someone's qualifications. You also want to look at their personality and other characteristics which can tell you a lot about who you are hiring.

Continue reading
0 Comments

Symantec Declares Antivirus “is dead”

 
b2ap3_thumbnail_antivirus_400.jpg
Some 25 years ago, Symantec, invented commercial antivirus software to protect computers from hackers.  Now they are telling us that such tactics are doomed to failure.  According to Symantec’s senior vice president, Brian Dye, antivirus “is dead”.  “We don’t think of antivirus as a moneymaker in any way.”  That’s a bold statement given the thousands of customers that shell out $50 or more per year for their Norton AntiVirus product.
Continue reading
0 Comments

Don’t Stoke the Flames – Build a Firewall

b2ap3_thumbnail_build_a_firewall_400.jpgIt's no secret that the Internet is full of dangerous activity. Too many people think their networks are safe without any kind of protection. We don't mean to say that the Internet isn't safe, but that it's only as safe as you make it for yourself. In order to keep your small business safe, you should implement protective software, like a firewall. A firewall can help keep your company safe from online threats, and believe us when we say that a little bit of protection goes a long way.

Continue reading
0 Comments

The Database Hack that Brought Down the Galactic Senate

b2ap3_thumbnail_star_wars_logo_400.jpgOn May 4th you may see more Star Wars T-shirts than normal. This is because May 4th is recognized around the galaxy as Star Wars Day (May the 4th be with you). Thanks to the abundant use of technology throughout this science fiction franchise, you can bet your podracer that we can find an IT lesson from Star Wars that can help your business!

Continue reading
0 Comments

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Microsoft Productivity Hackers Malware Google Business Software Business Computing Windows 10 Miscellaneous Workplace Tips Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing IT Support Communication User Tips VoIP Business Management Virtualization Server Network Smartphone Data Quick Tips Email Holiday Apps Disaster Recovery Alert Save Money Remote Computing Going Green Operating System Social Media Business Continuity Upgrade Mobile Device Management Saving Money Office Android Chrome Small Business Employer-Employee Relationship Ransomware Facebook WiFi Identity Theft Mobility Antivirus The Internet of Things Application Big Data Managed Service Provider Microsoft Office Best Practice Social Search Gmail Browser Current Events Government Saving Time Lithium-ion battery Information Technology Spam Printer Bandwidth Unified Threat Management Law Enforcement Hacking Office Tips Tablet BYOD Password Passwords Analytics History Telephone Systems Humor intranet Net Neutrality Firewall Streaming Media iPhone Laptop Collaboration Education Recovery Network Security User Error Automation Computers Disaster Hard Drives Maintenance Avoiding Downtime Fraud Phone System Router Apple Wireless Money Data Management Gadgets Smartphones Encryption Users USB Work/Life Balance communications Remote Monitoring Tech Support Flexibility Virtual Reality Marketing IT Consultant Google Drive Fax Server DDoS Administration Data Loss Benefits Content Filtering Wearable Technology Point of Sale Proactive IT PowerPoint Cost Management Office 365 Cybercrime Risk Management Online Currency Retail BDR Entertainment Managing Stress Private Cloud Wireless Technology Mobile Office Personal Information Update Budget IT Solutions VPN Managed IT Services Shortcut Business Intelligence Transportation Internet Exlporer Biometrics App Social Engineering Outlook Printer Server Telephony Customer Service Wi-Fi PDF Keyboard Uninterrupted Power Supply CloudSync Computing Politics Text Messaging Computer Accessories Hiring/Firing Programming Scalability Internet of Things Bloatware Compliance IT consulting Prodcuctivity Experience Applications Artificial Intelligence Distributed Denial of Service Mouse How To Sports Online Backup Inbound Marketing Branding Emails Audit Music Touchpad eWaste Network Congestion OneNote Twitter WIndows 7 Display Books Operating Sysytem Television Storage OneDrive Black Market Files Two-factor Authentication Bluetooth Bring Your Own Device Electronic Medical Records HaaS Trending Paperless Office Workplace Instant Messaging Chromecast Customer Relationship Management SharePoint User Safety Excel Miscelllaneous Website Battery Administrator RAM Teamwork Best Available Ebay Emergency Reputation HIPAA Travel Presentation Amazon Blogging Automobile Access CPU Meetings Regulations Cleaning ISP Hosted Solution Science Smart Phones 3D Printing Worker Commute Slow End of Support Running Cable Phishing Save Time Video Games Networking Windows 8 Robot Advertising Cameras Hacker Legal Data Theft Human Resources Near Field Communication Vendor Management Data storage

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code