Contact us today!
(469) 567-0181
(903) 458-9400
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Outsource Your IT to the Pros and Stop Doing IT the Hard Way

Outsource Your IT to the Pros and Stop Doing IT the Hard Way

How often does your technology experience trouble? If your business is constantly dealing with technical hiccups, your assets that are meant to be a boon to your organization, can quickly become a nuisance that holds you back. How can you take better care of your technology, and use it to usher in a new era of productivity?

Continue reading
0 Comments

4 Ways to Troubleshoot Network Performance Issues

b2ap3_thumbnail_rmm_it_400.jpgAre you experiencing performance issues with your computer network? Does it seem like it’s not running as effectively as it used to? Given the nature of technology, eventually, you’ll have to replace all of your computer hardware. But before you do, give your network a boost by trying these four IT maintenance best practices.

Continue reading
0 Comments

Tip of the Week: What to Look For and What to Avoid in a Consultant

b2ap3_thumbnail_consulting_tips_400.jpgSometimes you just don’t know what to do, and you don’t know where to turn for help. You don’t want to ask your competitors for anything, because they don’t need to know your weak points, and you feel crushed under the pressure of day-to-day operation. Maybe a hand once in a while isn’t such a bad thing.

Continue reading
0 Comments

Tip of the Week: How to Find the Right Outsourced IT Company for Your Business

b2ap3_thumbnail_your_outsourced_it_provider_400.jpgAs your company expands, you’re beginning to realize that one IT person isn’t enough to handle all of your technical needs. You feel like you need more hands on deck, but your budget won’t allow for it. You decide that your best option is to hire slowly and steadily, interviewing externally for the most qualified individuals. But, how can you be sure that they meet the needs of your company?

Continue reading
0 Comments

As Seen in Zoolander, Tech Support Miscommunication Can Be Frustrating

b2ap3_thumbnail_tech_support_miscommunication_400.jpgIT support is heavily reliant upon communication between both parties involved. Without both sides being on the same page, IT support miscommunications are far more likely to happen. Sometimes you just can’t help but laugh at poor communication skills, as seen in the 2001 movie Zoolander. But thankfully, these situations don’t arise too often in the non-fictional universe… right?

Continue reading
0 Comments

au·dit/ noun/: a systematic review or assessment of something

b2ap3_thumbnail_it_audit_400.jpgAre you confident that your company's network is 100 percent secure? The best way to answer "yes" to this question is with a network audit. This is a technical procedure where IT professionals analyze every nook and cranny of your system, looking for every possible vulnerability. No matter what the situation is with your company's IT management, a network audit is worth doing.

Continue reading
0 Comments

Even the White House Needs IT Services

b2ap3_thumbnail_white_house_needs_it_services_400.jpgA change is happening in the White House. Mikey Dickerson, a Google site reliability engineer, has just been appointed by the United States government as the deputy federal CIO, proving that even the big wigs need consulting from time-to-time.

Continue reading
0 Comments

How to Recognize a Champion IT Professional

b2ap3_thumbnail_technology_the_man_400.jpgWhen your business is in need of IT assistance, you want to make sure that you are getting the best of the best. However, the best course of action isn't to just look at someone's qualifications. You also want to look at their personality and other characteristics which can tell you a lot about who you are hiring.

Continue reading
0 Comments

Symantec Declares Antivirus “is dead”

 
b2ap3_thumbnail_antivirus_400.jpg
Some 25 years ago, Symantec, invented commercial antivirus software to protect computers from hackers.  Now they are telling us that such tactics are doomed to failure.  According to Symantec’s senior vice president, Brian Dye, antivirus “is dead”.  “We don’t think of antivirus as a moneymaker in any way.”  That’s a bold statement given the thousands of customers that shell out $50 or more per year for their Norton AntiVirus product.
Continue reading
0 Comments

Don’t Stoke the Flames – Build a Firewall

b2ap3_thumbnail_build_a_firewall_400.jpgIt's no secret that the Internet is full of dangerous activity. Too many people think their networks are safe without any kind of protection. We don't mean to say that the Internet isn't safe, but that it's only as safe as you make it for yourself. In order to keep your small business safe, you should implement protective software, like a firewall. A firewall can help keep your company safe from online threats, and believe us when we say that a little bit of protection goes a long way.

Continue reading
0 Comments

The Database Hack that Brought Down the Galactic Senate

b2ap3_thumbnail_star_wars_logo_400.jpgOn May 4th you may see more Star Wars T-shirts than normal. This is because May 4th is recognized around the galaxy as Star Wars Day (May the 4th be with you). Thanks to the abundant use of technology throughout this science fiction franchise, you can bet your podracer that we can find an IT lesson from Star Wars that can help your business!

Continue reading
0 Comments

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Software Business Computing Google Business Miscellaneous Workplace Tips Windows 10 Innovation Computer Backup Efficiency Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing IT Support User Tips Communication Business Management VoIP Server Network Data Quick Tips Smartphone Email Virtualization Holiday Going Green Save Money Remote Computing Business Continuity Mobile Device Management Operating System Social Media Saving Money Upgrade Office Apps Disaster Recovery Alert Android Chrome Small Business Identity Theft Employer-Employee Relationship Ransomware Antivirus The Internet of Things Mobility Big Data Managed Service Provider Microsoft Office Application Social Best Practice WiFi Facebook Current Events Government Lithium-ion battery Printer Information Technology Spam Bandwidth BYOD Unified Threat Management Hacking Tablet Law Enforcement Office Tips Passwords Password History Analytics Search Gmail Saving Time Browser Work/Life Balance Streaming Media Telephone Systems Hard Drives Education Maintenance Humor User Error Fraud Computers Disaster Recovery Network Security Automation Avoiding Downtime Phone System Router Encryption Apple Remote Monitoring Tech Support Gadgets Smartphones Users USB intranet Money Wireless Data Management Net Neutrality Firewall iPhone Collaboration Laptop communications Customer Service Telephony Content Filtering Online Currency Virtual Reality Wi-Fi Point of Sale Google Drive PowerPoint DDoS Flexibility Cost Management Benefits Retail BDR Entertainment Cybercrime Mobile Office Risk Management VPN Office 365 Private Cloud Managing Stress Wireless Technology IT Solutions App Update Personal Information Fax Server Budget IT Consultant Outlook Printer Server Data Loss Transportation Shortcut Business Intelligence Managed IT Services Wearable Technology Internet Exlporer Marketing Biometrics Administration Proactive IT Social Engineering Compliance Programming Display Data storage Hacker Human Resources Near Field Communication PDF Legal Inbound Marketing Uninterrupted Power Supply Keyboard Emails Audit Text Messaging Computer Accessories Bloatware Twitter OneNote Internet of Things Politics Applications Hiring/Firing IT consulting Artificial Intelligence Distributed Denial of Service Scalability Mouse RAM OneDrive Website Sports Experience Ebay Touchpad Branding Bring Your Own Device Paperless Office eWaste How To Network Congestion Music CPU Amazon Workplace Blogging Operating Sysytem WIndows 7 Miscelllaneous Television Storage Files Books Slow Two-factor Authentication Smart Phones Bluetooth HIPAA Trending Black Market Chromecast Electronic Medical Records Customer Relationship Management Travel Windows 8 SharePoint HaaS Regulations User Excel ISP Instant Messaging Administrator Safety Vendor Management 3D Printing Reputation Teamwork Best Available Battery Access Emergency Presentation Computing Meetings Cameras Science Data Theft Hosted Solution Automobile Cleaning Prodcuctivity End of Support Running Cable Phishing CloudSync Worker Commute Online Backup Robot Save Time Networking Advertising Video Games

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code