Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Make Sure Your Mobile Device Policy Covers These 3 Areas

Tip of the Week: Make Sure Your Mobile Device Policy Covers These 3 Areas

If we asked you to count the number of mobile devices in your workplace, would you be able to do so? This includes smartphones, laptops, tablets, and others--anything that’s not a workstation or hardware tied down to your location. While mobile devices can be beneficial for any business, it’s still important to keep security at the top of your mind. Here are three topics that you need to be sure you’ve considered before allowing mobile devices in the workplace.

Continue reading
0 Comments

Credit Card Companies Turn to Selfies to Prevent $118 Billion Worth of False Declines

Credit Card Companies Turn to Selfies to Prevent $118 Billion Worth of False Declines

Though it’s still a somewhat new concept, payment via mobile device is gaining in popularity. The latest smartphones make it easier than ever to pay bills or send money whenever needed. Yet, this also presents an interesting conundrum. What’s the best way to make mobile payments, and how can they be processed with minimal chance of being compromised?

Continue reading
0 Comments

Department of Education Forming New, Mobile-Friendly IT Infrastructure Plan

Department of Education Forming New, Mobile-Friendly IT Infrastructure Plan

More organizations are revamping their traditional IT infrastructure to favor new technology that allows for greater mobility. Not to be outdone, even major government departments are making this move, like the U.S. Department of Education.

Continue reading
0 Comments

DroidJack Malware is Super-Effective Against Impatient Pokémon Go Users

DroidJack Malware is Super-Effective Against Impatient Pokémon Go Users

Augmented reality is a growing trend in the technology industry, and perhaps one of the best known uses of it today can be found in the extremely popular mobile device app, Pokemon Go. However, hackers have seized the opportunity to infect players who want to “catch ‘em all” with a backdoor called DroidJack - something that certainly won’t help gamers “be the very best.”

Continue reading
0 Comments

5 Tips to Minimize the Risk Associated With Mobile Devices

b2ap3_thumbnail_byod_mobile_400.jpgHow many of your employees have a smartphone? The answer is probably most (if not all) of them. In the United States alone, nearly two-thirds of adults own a smartphone, and many of them depend on the device to do much of their personal computing. As a result, many workers, even if they are instructed not to, will use their devices while at your office. This is why many companies have put in place a comprehensive Bring Your Own Device (BYOD) strategy.

Continue reading
0 Comments

Tip of the Week: 4 Immediate Actions to Take After Your Mobile Device Has Been Stolen

b2ap3_thumbnail_lost_device_400.jpgThieves stealing mobile devices like laptops and smartphones have reached epidemic proportions. In fact, 2013 statistics from Consumer Reports and LoJack show that two million laptops were stolen that year, along with three million handsets. Translation; it’s way more likely for your mobile device to be stolen than you probably realize.

Continue reading
0 Comments

Tip of the Week: Don’t Be Duped By These 4 Battery Myths

b2ap3_thumbnail_batteries_that_last_400.jpgWhen was the last time you let your phone’s battery die on you? Due to the takeover of mobile technology in the workplace, smartphones have basically become inseparable from their owners, particularly the ever-busy business owner. Despite the imperative role that smartphones have in the workplace, you should know that there are several battery myths that might be holding you back from achieving maximum efficiency with your device.

Continue reading
0 Comments

Do Mobile Devices Sweeten Sales, or Crush Employee Productivity?

b2ap3_thumbnail_smartphone_questions_400.jpgWe’re all aware of how the proliferation of mobile devices is changing the workplace, but let’s take an objective look at this trend. Are mobile devices changing the workplace for the better? Are employees actually using their personal devices to get more work done? Or, is the BYOD trend a bunch of hype and nothing’s really changed? Let’s find out.

Continue reading
0 Comments

Apple’s iPhone 6 and iPhone 6+ Bend Expectations

b2ap3_thumbnail_iphone_6_and_6_plus_400.jpgApple is back with another iPhone! The Silicon Valley-based hardware and software manufacturer has released the new versions of their extremely popular iPhone series of devices. The two-headed approach that Apple took with their second incantation of the iPhone 5 (the 5s and 5c), is replicated this time out as well. After being surpassed by Samsung over the past two years, does the iPhone 6 and its larger version, the iPhone 6+, have what it takes to get Apple back on top?

Continue reading
0 Comments

Old Mobile Devices Might Be Hurting Your Business’s Security

b2ap3_thumbnail_old_tech_security_risk_400.jpgOne of the greatest things about today's technology is that it has grown more mobile, and some employees like to bring their own devices from home to use for their workplace. This is called BYOD, and while it is useful sometimes, it might be putting your business at risk.

Continue reading
0 Comments

Amazon is Playing With Fire

b2ap3_thumbnail_amazon_fire_phone_400.jpgMobile computing is literally everywhere; and, yes, that's the point of the technology. The mobile computing boom has presented major retailers with the opportunity to begin offering smartphones and tablets. The world's largest online retailer, Amazon, is the next company to launch a mobile device platform, by offering their new "Fire" smartphone, CEO Jeff Bezos announced on June 18th.

Continue reading
0 Comments

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Microsoft Productivity Hackers Malware Google Business Software Business Computing Windows 10 Miscellaneous Workplace Tips Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing IT Support Communication User Tips Business Management VoIP Virtualization Smartphone Email Holiday Server Network Data Quick Tips Remote Computing Apps Disaster Recovery Alert Operating System Social Media Upgrade Office Going Green Business Continuity Mobile Device Management Saving Money Save Money Chrome Android Small Business The Internet of Things WiFi Big Data Mobility Identity Theft Managed Service Provider Microsoft Office Antivirus Social Application Facebook Best Practice Employer-Employee Relationship Ransomware Bandwidth Unified Threat Management Hacking Tablet Saving Time Passwords Lithium-ion battery Law Enforcement Printer Office Tips Analytics Password History Search Gmail Browser BYOD Current Events Government Information Technology Spam Avoiding Downtime Recovery Phone System intranet Net Neutrality Router Firewall Network Security iPhone Automation Laptop Apple Collaboration Gadgets Smartphones Hard Drives Maintenance Users USB Fraud Money Wireless Data Management Streaming Media Education communications Work/Life Balance Encryption User Error Telephone Systems Computers Disaster Remote Monitoring Humor Tech Support Entertainment Benefits IT Consultant Fax Server Mobile Office Data Loss Cybercrime Wearable Technology Risk Management Office 365 Proactive IT IT Solutions Private Cloud Managing Stress Wireless Technology Online Currency Update Outlook Printer Server Personal Information Budget Marketing Shortcut Business Intelligence Administration Transportation Managed IT Services Internet Exlporer Biometrics Content Filtering VPN Social Engineering Telephony Point of Sale Customer Service PowerPoint Cost Management App Wi-Fi Virtual Reality Google Drive Retail DDoS Flexibility BDR Bloatware Bring Your Own Device Internet of Things Politics Applications Hiring/Firing IT consulting Paperless Office Artificial Intelligence Computing Workplace Distributed Denial of Service Scalability Mouse Sports Experience Touchpad Branding Miscelllaneous Prodcuctivity eWaste How To Network Congestion Music Operating Sysytem WIndows 7 Online Backup HIPAA Travel Television Storage Two-factor Authentication Regulations Files Books ISP Bluetooth Trending Black Market Display 3D Printing Customer Relationship Management Chromecast Electronic Medical Records SharePoint HaaS User Instant Messaging Excel Cameras Administrator Safety Reputation Teamwork Best Available Data Theft Battery Presentation Access Emergency CloudSync Meetings Website RAM Hosted Solution Automobile Ebay Science Cleaning Compliance End of Support Amazon Programming Running Cable Blogging Phishing CPU Worker Commute Networking Robot Save Time Inbound Marketing Advertising Smart Phones Video Games Slow Emails Audit Human Resources Near Field Communication Data storage Hacker Twitter PDF OneNote Legal Windows 8 Uninterrupted Power Supply Keyboard Text Messaging OneDrive Vendor Management Computer Accessories

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code