Contact us today!
(469) 567-0181
(903) 458-9400
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 3 Bluetooth Gadgets for Enhanced Productivity On Mobile Devices

b2ap3_thumbnail_mobile_device_productivity_400.jpgIf you’ve ever tried to work while out of the office on your smartphone or tablet, you’ll have realized that mobile devices aren’t the optimal productivity machine to get the most quality work done. However, if you take advantage of the proper gadgets, you can take back your productivity and continue to get work done, even under the worst circumstances.

Continue reading
0 Comments

Tip of the Week: 4 Immediate Actions to Take After Your Mobile Device Has Been Stolen

b2ap3_thumbnail_lost_device_400.jpgThieves stealing mobile devices like laptops and smartphones have reached epidemic proportions. In fact, 2013 statistics from Consumer Reports and LoJack show that two million laptops were stolen that year, along with three million handsets. Translation; it’s way more likely for your mobile device to be stolen than you probably realize.

Continue reading
0 Comments

Do Mobile Devices Sweeten Sales, or Crush Employee Productivity?

b2ap3_thumbnail_smartphone_questions_400.jpgWe’re all aware of how the proliferation of mobile devices is changing the workplace, but let’s take an objective look at this trend. Are mobile devices changing the workplace for the better? Are employees actually using their personal devices to get more work done? Or, is the BYOD trend a bunch of hype and nothing’s really changed? Let’s find out.

Continue reading
0 Comments

Tip of the Week: How to Remotely Wipe Your iPhone or iPad

b2ap3_thumbnail_wipe_clean_ios_400.jpgWith the new iPhone 6 release just a few short weeks ago, many users are excited to ditch their old devices and get the flexible new piece of hardware. Unfortunately, these users might not take into account that their phones could potentially hold private information which should be deleted before forking over the device.

Continue reading
0 Comments

6 Bring Your Own Device Tips to Help Bring the Business

b2ap3_thumbnail_bring_your_own_for_work_400.jpgDoing business in today's world is dependant on mobility, and if you aren't ready to shift toward this new technology trend, you should seriously reconsider. A lot of the time, businesses will allow their employees to bring in their own mobile devices for use in the workplace. This trend is called a Bring Your Own Device (BYOD).

Continue reading
0 Comments

Old Devices Can Compromise Security

b2ap3_thumbnail_device_security_400.jpgAs a responsible business owner, you know that using the latest technology and running updated software is a key component to your company's network security. However, your employees may not value the latest tech like you do, which could result in a major data breach, despite your best efforts to keep your company current.

Continue reading
0 Comments

Don’t Overlook the Mobile Devices Accessing Your Network

b2ap3_thumbnail_mobile_overlooked_400.jpgThe number of employees using their personal devices for work purposes (BYOD) continues to increase rapidly. According to Juniper Research, BYOD will account for over one-third of all mobile devices being used within the next few years. Not adjusting procedures to accommodate for this trend can leave your company's sensitive information vulnerable.

Continue reading
0 Comments

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Software Business Business Computing Google Miscellaneous Workplace Tips Windows 10 Innovation Computer Backup Efficiency Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing IT Support Communication User Tips Business Management VoIP Smartphone Server Network Email Data Quick Tips Holiday Virtualization Remote Computing Operating System Social Media Going Green Upgrade Business Continuity Mobile Device Management Office Saving Money Disaster Recovery Apps Alert Save Money Chrome Small Business Android WiFi Identity Theft The Internet of Things Antivirus Application Big Data Managed Service Provider Microsoft Office Best Practice Mobility Social Employer-Employee Relationship Ransomware Facebook Information Technology Saving Time Spam Bandwidth Lithium-ion battery Law Enforcement Unified Threat Management Printer Hacking Office Tips Tablet Password Passwords BYOD Analytics History Search Gmail Browser Current Events Government Work/Life Balance Avoiding Downtime Maintenance Phone System Hard Drives Router Fraud Apple Money Data Management Gadgets Smartphones Users USB communications Encryption Telephone Systems Humor Remote Monitoring Tech Support Streaming Media Wireless Recovery Education intranet Firewall Net Neutrality User Error iPhone Network Security Automation Collaboration Laptop Computers Disaster Retail Proactive IT BDR Private Cloud Entertainment Managing Stress Wireless Technology Online Currency Wi-Fi Mobile Office Update Flexibility Budget IT Solutions Transportation Shortcut Business Intelligence Internet Exlporer Office 365 VPN Biometrics Social Engineering Outlook Customer Service Printer Server Telephony Virtual Reality App Google Drive Marketing DDoS Administration Personal Information Benefits IT Consultant Fax Server Content Filtering Data Loss Point of Sale PowerPoint Cybercrime Managed IT Services Cost Management Risk Management Wearable Technology Storage Save Time Television Files Video Games Two-factor Authentication OneDrive Bluetooth Bring Your Own Device Display Hacker Trending Paperless Office Chromecast Legal Customer Relationship Management Workplace SharePoint User Excel Keyboard Miscelllaneous Administrator Reputation Politics Teamwork Best Available Hiring/Firing HIPAA Access Travel Scalability Presentation Website RAM Regulations Experience Meetings Science ISP Ebay Hosted Solution How To 3D Printing Blogging CPU End of Support Music Running Cable Amazon Phishing Robot Networking Slow Advertising Cameras Books Smart Phones Data Theft Data storage Black Market Human Resources Near Field Communication Windows 8 PDF Electronic Medical Records Uninterrupted Power Supply CloudSync HaaS Instant Messaging Computer Accessories Vendor Management Text Messaging Safety Internet of Things Compliance Bloatware Programming Applications Battery IT consulting Computing Mouse Artificial Intelligence Emergency Distributed Denial of Service Sports Inbound Marketing Touchpad Emails Automobile Branding Audit Prodcuctivity Network Congestion Cleaning eWaste Twitter OneNote Online Backup Operating Sysytem Worker Commute WIndows 7

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code