Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 3 Bluetooth Gadgets for Enhanced Productivity On Mobile Devices

b2ap3_thumbnail_mobile_device_productivity_400.jpgIf you’ve ever tried to work while out of the office on your smartphone or tablet, you’ll have realized that mobile devices aren’t the optimal productivity machine to get the most quality work done. However, if you take advantage of the proper gadgets, you can take back your productivity and continue to get work done, even under the worst circumstances.

Continue reading

Tip of the Week: 4 Immediate Actions to Take After Your Mobile Device Has Been Stolen

b2ap3_thumbnail_lost_device_400.jpgThieves stealing mobile devices like laptops and smartphones have reached epidemic proportions. In fact, 2013 statistics from Consumer Reports and LoJack show that two million laptops were stolen that year, along with three million handsets. Translation; it’s way more likely for your mobile device to be stolen than you probably realize.

Continue reading

Do Mobile Devices Sweeten Sales, or Crush Employee Productivity?

b2ap3_thumbnail_smartphone_questions_400.jpgWe’re all aware of how the proliferation of mobile devices is changing the workplace, but let’s take an objective look at this trend. Are mobile devices changing the workplace for the better? Are employees actually using their personal devices to get more work done? Or, is the BYOD trend a bunch of hype and nothing’s really changed? Let’s find out.

Continue reading

Tip of the Week: How to Remotely Wipe Your iPhone or iPad

b2ap3_thumbnail_wipe_clean_ios_400.jpgWith the new iPhone 6 release just a few short weeks ago, many users are excited to ditch their old devices and get the flexible new piece of hardware. Unfortunately, these users might not take into account that their phones could potentially hold private information which should be deleted before forking over the device.

Continue reading

6 Bring Your Own Device Tips to Help Bring the Business

b2ap3_thumbnail_bring_your_own_for_work_400.jpgDoing business in today's world is dependant on mobility, and if you aren't ready to shift toward this new technology trend, you should seriously reconsider. A lot of the time, businesses will allow their employees to bring in their own mobile devices for use in the workplace. This trend is called a Bring Your Own Device (BYOD).

Continue reading

Old Devices Can Compromise Security

b2ap3_thumbnail_device_security_400.jpgAs a responsible business owner, you know that using the latest technology and running updated software is a key component to your company's network security. However, your employees may not value the latest tech like you do, which could result in a major data breach, despite your best efforts to keep your company current.

Continue reading

Don’t Overlook the Mobile Devices Accessing Your Network

b2ap3_thumbnail_mobile_overlooked_400.jpgThe number of employees using their personal devices for work purposes (BYOD) continues to increase rapidly. According to Juniper Research, BYOD will account for over one-third of all mobile devices being used within the next few years. Not adjusting procedures to accommodate for this trend can leave your company's sensitive information vulnerable.

Continue reading

Sign Up for Our Newsletter

Powered by ChronoForms -

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Software Business Business Computing Google Windows 10 Miscellaneous Workplace Tips Backup Efficiency Innovation Computer Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing Communication User Tips IT Support Business Management VoIP Smartphone Server Network Email Holiday Data Quick Tips Virtualization Operating System Social Media Upgrade Going Green Business Continuity Office Mobile Device Management Saving Money Disaster Recovery Apps Alert Save Money Remote Computing Small Business Android Chrome The Internet of Things Antivirus Big Data Managed Service Provider Microsoft Office Social Application Facebook Best Practice Mobility Employer-Employee Relationship Ransomware WiFi Identity Theft Lithium-ion battery Hacking Printer Tablet Passwords Law Enforcement BYOD Office Tips Password Analytics History Search Gmail Browser Current Events Government Information Technology Spam Saving Time Bandwidth Unified Threat Management Router Maintenance Network Security Hard Drives Apple Automation Fraud Work/Life Balance Gadgets Smartphones Users USB Encryption Data Management Money Remote Monitoring Streaming Media Tech Support Education communications intranet User Error Net Neutrality Telephone Systems Firewall Computers iPhone Disaster Collaboration Laptop Humor Avoiding Downtime Phone System Recovery Wireless Online Currency Cybercrime Managed IT Services Risk Management IT Solutions Managing Stress Private Cloud Wireless Technology Wi-Fi Update Outlook Flexibility Printer Server VPN Budget Marketing Transportation Administration Shortcut App Business Intelligence Internet Exlporer Content Filtering Biometrics Office 365 Social Engineering Telephony IT Consultant Customer Service Fax Server Point of Sale PowerPoint Data Loss Cost Management Virtual Reality Google Drive Retail BDR Wearable Technology DDoS Entertainment Personal Information Proactive IT Benefits Mobile Office Automobile Touchpad Miscelllaneous Branding Network Congestion Cleaning eWaste Worker Commute Operating Sysytem HIPAA WIndows 7 Television Storage Save Time Travel Regulations Files Two-factor Authentication Video Games Bluetooth ISP Trending Website RAM Hacker 3D Printing Chromecast Ebay Customer Relationship Management Legal User SharePoint Blogging Excel CPU Keyboard Amazon Cameras Administrator Best Available Politics Reputation Data Theft Teamwork Slow Hiring/Firing Smart Phones Access Presentation Scalability Experience CloudSync Meetings Hosted Solution Windows 8 Science How To Programming Phishing Music End of Support Compliance Running Cable Vendor Management Robot Networking Books Advertising Inbound Marketing Emails Audit Computing Data storage Human Resources Near Field Communication Black Market OneNote Electronic Medical Records PDF Twitter Prodcuctivity Uninterrupted Power Supply HaaS Instant Messaging OneDrive Computer Accessories Online Backup Safety Text Messaging Internet of Things Bring Your Own Device Bloatware Battery Applications Paperless Office IT consulting Workplace Mouse Emergency Artificial Intelligence Distributed Denial of Service Sports Display

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...