Contact us today!
(469) 567-0181
(903) 458-9400
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Make Sure Your Mobile Device Policy Covers These 3 Areas

Tip of the Week: Make Sure Your Mobile Device Policy Covers These 3 Areas

If we asked you to count the number of mobile devices in your workplace, would you be able to do so? This includes smartphones, laptops, tablets, and others--anything that’s not a workstation or hardware tied down to your location. While mobile devices can be beneficial for any business, it’s still important to keep security at the top of your mind. Here are three topics that you need to be sure you’ve considered before allowing mobile devices in the workplace.

Continue reading
0 Comments

Credit Card Companies Turn to Selfies to Prevent $118 Billion Worth of False Declines

Credit Card Companies Turn to Selfies to Prevent $118 Billion Worth of False Declines

Though it’s still a somewhat new concept, payment via mobile device is gaining in popularity. The latest smartphones make it easier than ever to pay bills or send money whenever needed. Yet, this also presents an interesting conundrum. What’s the best way to make mobile payments, and how can they be processed with minimal chance of being compromised?

Continue reading
0 Comments

Department of Education Forming New, Mobile-Friendly IT Infrastructure Plan

Department of Education Forming New, Mobile-Friendly IT Infrastructure Plan

More organizations are revamping their traditional IT infrastructure to favor new technology that allows for greater mobility. Not to be outdone, even major government departments are making this move, like the U.S. Department of Education.

Continue reading
0 Comments

DroidJack Malware is Super-Effective Against Impatient Pokémon Go Users

DroidJack Malware is Super-Effective Against Impatient Pokémon Go Users

Augmented reality is a growing trend in the technology industry, and perhaps one of the best known uses of it today can be found in the extremely popular mobile device app, Pokemon Go. However, hackers have seized the opportunity to infect players who want to “catch ‘em all” with a backdoor called DroidJack - something that certainly won’t help gamers “be the very best.”

Continue reading
0 Comments

5 Tips to Minimize the Risk Associated With Mobile Devices

b2ap3_thumbnail_byod_mobile_400.jpgHow many of your employees have a smartphone? The answer is probably most (if not all) of them. In the United States alone, nearly two-thirds of adults own a smartphone, and many of them depend on the device to do much of their personal computing. As a result, many workers, even if they are instructed not to, will use their devices while at your office. This is why many companies have put in place a comprehensive Bring Your Own Device (BYOD) strategy.

Continue reading
0 Comments

Tip of the Week: 4 Immediate Actions to Take After Your Mobile Device Has Been Stolen

b2ap3_thumbnail_lost_device_400.jpgThieves stealing mobile devices like laptops and smartphones have reached epidemic proportions. In fact, 2013 statistics from Consumer Reports and LoJack show that two million laptops were stolen that year, along with three million handsets. Translation; it’s way more likely for your mobile device to be stolen than you probably realize.

Continue reading
0 Comments

Tip of the Week: Don’t Be Duped By These 4 Battery Myths

b2ap3_thumbnail_batteries_that_last_400.jpgWhen was the last time you let your phone’s battery die on you? Due to the takeover of mobile technology in the workplace, smartphones have basically become inseparable from their owners, particularly the ever-busy business owner. Despite the imperative role that smartphones have in the workplace, you should know that there are several battery myths that might be holding you back from achieving maximum efficiency with your device.

Continue reading
0 Comments

Do Mobile Devices Sweeten Sales, or Crush Employee Productivity?

b2ap3_thumbnail_smartphone_questions_400.jpgWe’re all aware of how the proliferation of mobile devices is changing the workplace, but let’s take an objective look at this trend. Are mobile devices changing the workplace for the better? Are employees actually using their personal devices to get more work done? Or, is the BYOD trend a bunch of hype and nothing’s really changed? Let’s find out.

Continue reading
0 Comments

Apple’s iPhone 6 and iPhone 6+ Bend Expectations

b2ap3_thumbnail_iphone_6_and_6_plus_400.jpgApple is back with another iPhone! The Silicon Valley-based hardware and software manufacturer has released the new versions of their extremely popular iPhone series of devices. The two-headed approach that Apple took with their second incantation of the iPhone 5 (the 5s and 5c), is replicated this time out as well. After being surpassed by Samsung over the past two years, does the iPhone 6 and its larger version, the iPhone 6+, have what it takes to get Apple back on top?

Continue reading
0 Comments

Old Mobile Devices Might Be Hurting Your Business’s Security

b2ap3_thumbnail_old_tech_security_risk_400.jpgOne of the greatest things about today's technology is that it has grown more mobile, and some employees like to bring their own devices from home to use for their workplace. This is called BYOD, and while it is useful sometimes, it might be putting your business at risk.

Continue reading
0 Comments

Amazon is Playing With Fire

b2ap3_thumbnail_amazon_fire_phone_400.jpgMobile computing is literally everywhere; and, yes, that's the point of the technology. The mobile computing boom has presented major retailers with the opportunity to begin offering smartphones and tablets. The world's largest online retailer, Amazon, is the next company to launch a mobile device platform, by offering their new "Fire" smartphone, CEO Jeff Bezos announced on June 18th.

Continue reading
0 Comments

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Microsoft Productivity Hackers Malware Software Business Business Computing Google Miscellaneous Workplace Tips Windows 10 Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware Mobile Devices Mobile Computing IT Services Health User Tips IT Support Communication VoIP Business Management Holiday Data Quick Tips Virtualization Smartphone Server Network Email Mobile Device Management Saving Money Disaster Recovery Apps Alert Save Money Remote Computing Operating System Social Media Upgrade Going Green Business Continuity Office Small Business Android Chrome Social Facebook Application Best Practice Mobility WiFi Identity Theft Employer-Employee Relationship Ransomware The Internet of Things Big Data Antivirus Managed Service Provider Microsoft Office Analytics History Search Gmail Law Enforcement Office Tips Browser Current Events Password Government Information Technology Spam Saving Time Bandwidth Unified Threat Management Lithium-ion battery Hacking Printer Tablet Passwords BYOD Users USB Work/Life Balance Encryption Remote Monitoring Streaming Media Tech Support Education Money Data Management User Error intranet Net Neutrality Firewall iPhone Computers Disaster Collaboration Laptop communications Avoiding Downtime Telephone Systems Phone System Router Humor Hard Drives Maintenance Apple Fraud Recovery Wireless Gadgets Network Security Automation Smartphones Outlook Printer Server Private Cloud VPN Managing Stress Wireless Technology Wi-Fi Marketing Update App Administration Flexibility Budget Content Filtering IT Consultant Fax Server Point of Sale Transportation Shortcut Business Intelligence PowerPoint Data Loss Cost Management Internet Exlporer Biometrics Retail Office 365 BDR Wearable Technology Social Engineering Customer Service Entertainment Telephony Proactive IT Virtual Reality Mobile Office Google Drive Online Currency DDoS Personal Information Benefits IT Solutions Managed IT Services Cybercrime Risk Management Blogging Save Time CPU Television Amazon Storage Two-factor Authentication Cameras Video Games Files Bluetooth Data Theft Hacker Slow Trending Smart Phones Customer Relationship Management Legal Chromecast SharePoint User CloudSync Windows 8 Keyboard Excel Administrator Compliance Politics Programming Reputation Teamwork Best Available Vendor Management Hiring/Firing Access Presentation Scalability Inbound Marketing Experience Meetings Science Emails Audit Hosted Solution Computing How To Twitter Music OneNote End of Support Running Cable Phishing Prodcuctivity Robot Networking Books Online Backup OneDrive Advertising Bring Your Own Device Data storage Human Resources Near Field Communication Paperless Office Black Market Electronic Medical Records Workplace PDF Display HaaS Uninterrupted Power Supply Miscelllaneous Instant Messaging Safety Text Messaging Computer Accessories Bloatware Internet of Things Applications IT consulting HIPAA Battery Travel Emergency Artificial Intelligence Distributed Denial of Service Mouse Regulations Sports ISP Touchpad Branding Automobile Cleaning RAM 3D Printing eWaste Network Congestion Website Ebay Operating Sysytem WIndows 7 Worker Commute

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code