Contact us today!
(469) 567-0181
(903) 458-9400
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Outsource Your IT to the Pros and Stop Doing IT the Hard Way

Outsource Your IT to the Pros and Stop Doing IT the Hard Way

How often does your technology experience trouble? If your business is constantly dealing with technical hiccups, your assets that are meant to be a boon to your organization, can quickly become a nuisance that holds you back. How can you take better care of your technology, and use it to usher in a new era of productivity?

Continue reading
0 Comments

4 Ways to Troubleshoot Network Performance Issues

b2ap3_thumbnail_rmm_it_400.jpgAre you experiencing performance issues with your computer network? Does it seem like it’s not running as effectively as it used to? Given the nature of technology, eventually, you’ll have to replace all of your computer hardware. But before you do, give your network a boost by trying these four IT maintenance best practices.

Continue reading
0 Comments

Tip of the Week: What to Look For and What to Avoid in a Consultant

b2ap3_thumbnail_consulting_tips_400.jpgSometimes you just don’t know what to do, and you don’t know where to turn for help. You don’t want to ask your competitors for anything, because they don’t need to know your weak points, and you feel crushed under the pressure of day-to-day operation. Maybe a hand once in a while isn’t such a bad thing.

Continue reading
0 Comments

Tip of the Week: How to Find the Right Outsourced IT Company for Your Business

b2ap3_thumbnail_your_outsourced_it_provider_400.jpgAs your company expands, you’re beginning to realize that one IT person isn’t enough to handle all of your technical needs. You feel like you need more hands on deck, but your budget won’t allow for it. You decide that your best option is to hire slowly and steadily, interviewing externally for the most qualified individuals. But, how can you be sure that they meet the needs of your company?

Continue reading
0 Comments

As Seen in Zoolander, Tech Support Miscommunication Can Be Frustrating

b2ap3_thumbnail_tech_support_miscommunication_400.jpgIT support is heavily reliant upon communication between both parties involved. Without both sides being on the same page, IT support miscommunications are far more likely to happen. Sometimes you just can’t help but laugh at poor communication skills, as seen in the 2001 movie Zoolander. But thankfully, these situations don’t arise too often in the non-fictional universe… right?

Continue reading
0 Comments

au·dit/ noun/: a systematic review or assessment of something

b2ap3_thumbnail_it_audit_400.jpgAre you confident that your company's network is 100 percent secure? The best way to answer "yes" to this question is with a network audit. This is a technical procedure where IT professionals analyze every nook and cranny of your system, looking for every possible vulnerability. No matter what the situation is with your company's IT management, a network audit is worth doing.

Continue reading
0 Comments

Even the White House Needs IT Services

b2ap3_thumbnail_white_house_needs_it_services_400.jpgA change is happening in the White House. Mikey Dickerson, a Google site reliability engineer, has just been appointed by the United States government as the deputy federal CIO, proving that even the big wigs need consulting from time-to-time.

Continue reading
0 Comments

How to Recognize a Champion IT Professional

b2ap3_thumbnail_technology_the_man_400.jpgWhen your business is in need of IT assistance, you want to make sure that you are getting the best of the best. However, the best course of action isn't to just look at someone's qualifications. You also want to look at their personality and other characteristics which can tell you a lot about who you are hiring.

Continue reading
0 Comments

Symantec Declares Antivirus “is dead”

 
b2ap3_thumbnail_antivirus_400.jpg
Some 25 years ago, Symantec, invented commercial antivirus software to protect computers from hackers.  Now they are telling us that such tactics are doomed to failure.  According to Symantec’s senior vice president, Brian Dye, antivirus “is dead”.  “We don’t think of antivirus as a moneymaker in any way.”  That’s a bold statement given the thousands of customers that shell out $50 or more per year for their Norton AntiVirus product.
Recent comment in this post
Summer Champion
Symantec hs some power of the declaration over the antivirus that was going to end this month along with all facts. I used to have... Read More
Monday, 04 November 2019 23:48
Continue reading
1 Comment

Don’t Stoke the Flames – Build a Firewall

b2ap3_thumbnail_build_a_firewall_400.jpgIt's no secret that the Internet is full of dangerous activity. Too many people think their networks are safe without any kind of protection. We don't mean to say that the Internet isn't safe, but that it's only as safe as you make it for yourself. In order to keep your small business safe, you should implement protective software, like a firewall. A firewall can help keep your company safe from online threats, and believe us when we say that a little bit of protection goes a long way.

Continue reading
0 Comments

The Database Hack that Brought Down the Galactic Senate

b2ap3_thumbnail_star_wars_logo_400.jpgOn May 4th you may see more Star Wars T-shirts than normal. This is because May 4th is recognized around the galaxy as Star Wars Day (May the 4th be with you). Thanks to the abundant use of technology throughout this science fiction franchise, you can bet your podracer that we can find an IT lesson from Star Wars that can help your business!

Continue reading
0 Comments

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Software Business Computing Business Google Miscellaneous Workplace Tips Windows 10 Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing IT Support Communication User Tips Business Management VoIP Server Smartphone Network Data Email Quick Tips Holiday Virtualization Alert Save Money Remote Computing Operating System Going Green Social Media Upgrade Business Continuity Mobile Device Management Office Saving Money Disaster Recovery Apps Android Chrome Small Business Mobility WiFi Identity Theft Application Antivirus Best Practice The Internet of Things Big Data Managed Service Provider Employer-Employee Relationship Microsoft Office Ransomware Social Facebook Current Events Government Law Enforcement Saving Time Office Tips Information Technology Password Spam Lithium-ion battery Bandwidth Printer Unified Threat Management Hacking Tablet BYOD Passwords History Analytics Search Gmail Browser intranet Streaming Media Firewall Net Neutrality iPhone Education Collaboration Laptop User Error Disaster Computers Wireless Maintenance Data Management Money Hard Drives Avoiding Downtime Phone System Fraud Router Apple communications Work/Life Balance Telephone Systems Gadgets Humor Smartphones Encryption Users USB Recovery Remote Monitoring Network Security Tech Support Automation Office 365 IT Consultant Fax Server Content Filtering Managing Stress Data Loss Private Cloud Wireless Technology Point of Sale PowerPoint Wearable Technology Cost Management Update Proactive IT Personal Information Retail BDR Online Currency Entertainment Budget Business Intelligence Mobile Office Transportation Shortcut Managed IT Services Internet Exlporer Biometrics Social Engineering Telephony Customer Service IT Solutions Wi-Fi Virtual Reality Google Drive VPN DDoS Flexibility Outlook Benefits Printer Server App Cybercrime Marketing Risk Management Administration Computing Television Compliance Storage Programming Files Books Two-factor Authentication Bluetooth Prodcuctivity Trending Black Market Inbound Marketing Audit Chromecast Electronic Medical Records Emails Customer Relationship Management SharePoint HaaS User Online Backup Instant Messaging Twitter Excel OneNote Administrator Safety Teamwork Best Available Reputation Battery Display OneDrive Bring Your Own Device Presentation Access Emergency Meetings Paperless Office Hosted Solution Automobile Science Workplace Cleaning Running Cable Miscelllaneous Phishing End of Support Worker Commute Robot Save Time Networking Video Games Website HIPAA RAM Advertising Ebay Travel Near Field Communication Data storage Hacker Regulations Human Resources Amazon Legal Blogging CPU ISP PDF 3D Printing Uninterrupted Power Supply Keyboard Smart Phones Computer Accessories Slow Text Messaging Internet of Things Politics Bloatware IT consulting Applications Hiring/Firing Cameras Distributed Denial of Service Scalability Windows 8 Data Theft Mouse Artificial Intelligence Sports Experience Touchpad Branding eWaste How To Vendor Management CloudSync Network Congestion Music WIndows 7 Operating Sysytem

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code