Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why Hackers Want You to Vote in the Upcoming Election

Why Hackers Want You to Vote in the Upcoming Election

Tomorrow is the big day--the day when the American people cast their votes for the next President of the United States. While there may still be a few undecided voters out there, something that they may not be considering includes the machines that they will be using to cast their ballots. It turns out that there may be a major problem with some voting systems in the form of weak cyber security.

Continue reading
0 Comments

FBI Director Insists Government Can Access Any Private Record

FBI Director Insists Government Can Access Any Private Record

Does the U.S. Constitution allow the American government to access the electronic devices of its citizens? According to FBI Director James Comey’s statements at Symantec’s Annual Government Symposium, it certainly does.

Continue reading
0 Comments

Couple Exploits Vulnerability With IRS Filing System, Steals $1M, Goes to Jail

Couple Exploits Vulnerability With IRS Filing System, Steals $1M, Goes to Jail

The Internal Revenue Service is one organization that you don’t want to mess with. Thanks to their antics filing fraudulent tax returns through the often-exploited Get Transcript site managed by the IRS, Anthony and Sonia Alika have to do some time in the slammer; and that’s not even mentioning what they have to pay the IRS in restitution.

Continue reading
0 Comments

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Business Software Business Computing Google Miscellaneous Windows 10 Workplace Tips Backup Efficiency Innovation Computer Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing Communication User Tips IT Support Business Management VoIP Server Email Holiday Network Data Quick Tips Virtualization Smartphone Upgrade Going Green Office Business Continuity Mobile Device Management Saving Money Apps Disaster Recovery Save Money Alert Remote Computing Operating System Social Media Small Business Android Chrome Big Data Ransomware Mobility Managed Service Provider Antivirus Microsoft Office Social Facebook Application Best Practice WiFi The Internet of Things Identity Theft Employer-Employee Relationship Lithium-ion battery Printer Passwords BYOD Analytics History Search Gmail Browser Law Enforcement Current Events Government Office Tips Password Information Technology Spam Bandwidth Unified Threat Management Saving Time Hacking Tablet Humor Hard Drives Maintenance Gadgets Smartphones Fraud Recovery Users USB Network Security Automation Wireless Encryption Streaming Media Work/Life Balance Education Remote Monitoring Tech Support User Error Computers Disaster Money Data Management intranet Net Neutrality Firewall iPhone Laptop Avoiding Downtime Collaboration Phone System communications Router Apple Telephone Systems Google Drive Online Currency IT Solutions DDoS Benefits Personal Information Outlook Printer Server Cybercrime Risk Management Marketing Private Cloud Managed IT Services Managing Stress VPN Wireless Technology Administration Content Filtering Update App Point of Sale Wi-Fi PowerPoint Cost Management Budget Flexibility IT Consultant Retail Fax Server Transportation BDR Shortcut Business Intelligence Entertainment Data Loss Internet Exlporer Biometrics Wearable Technology Mobile Office Social Engineering Customer Service Telephony Proactive IT Office 365 Virtual Reality Travel Regulations Text Messaging Black Market Computer Accessories Electronic Medical Records Bloatware ISP Internet of Things Applications 3D Printing HaaS IT consulting Artificial Intelligence Distributed Denial of Service Instant Messaging Mouse Sports Safety Touchpad Branding Network Congestion Cameras Website RAM eWaste Battery Emergency Ebay Data Theft Operating Sysytem WIndows 7 Storage Amazon Blogging CPU Television Automobile Files Cleaning Two-factor Authentication CloudSync Bluetooth Worker Commute Smart Phones Slow Trending Programming Chromecast Save Time Customer Relationship Management Compliance SharePoint Video Games User Excel Windows 8 Administrator Hacker Inbound Marketing Emails Audit Reputation Teamwork Legal Best Available Vendor Management OneNote Access Keyboard Presentation Twitter Meetings Politics Science Computing Hosted Solution OneDrive Hiring/Firing Bring Your Own Device End of Support Running Cable Scalability Phishing Experience Prodcuctivity Paperless Office Workplace Robot Networking Advertising Online Backup How To Music Miscelllaneous Data storage Human Resources Near Field Communication PDF Books Display HIPAA Uninterrupted Power Supply

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code