Contact us today!
(469) 567-0181
(903) 458-9400
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: The Easiest Way to Share Files Between 2 PCs

b2ap3_thumbnail_new_home_networking_400.jpgSo you’ve got two personal computers and you need to share a file from one to the other. What’s the best way to go about this? You might be surprised to learn that doing this is as easy as dragging and dropping.

Continue reading
0 Comments

How a Small Bottleneck Issue Can Significantly Hinder Network Performance

b2ap3_thumbnail_bottlenecking_network_400.jpgIf you shell out for brand new office equipment, you’ll naturally expect it to perform better than your older machines. Sometimes the age of your network hardware isn’t the only problem affecting your network’s performance. More often than not, network bottlenecking could be the issue at hand.

Continue reading
0 Comments

Tip of the Week: 5 Ways to Extend Your WiFi Signal

b2ap3_thumbnail_wifi_extention_400.jpgToday, having a strong WiFi signal is critical. You need a reliable signal for every part of your home, office, and even outside the building. Is your wireless signal strong in some areas and spotty in others? Would your life be immensely easier if your signal extended for just one or two more rooms? For this week’s tip, here’s how you can extend your WiFi signal.

Continue reading
0 Comments

How Will Future Technologies Change Two-Factor Authentication?

b2ap3_thumbnail_two_factor_authentication_400.jpgIn these times, passwords are losing their effectiveness. Hackers can now input millions of passwords every second to crack your code. Even now, professionals are working on new solutions which can jumpstart online security. While using a password is still an ideal choice, there are plenty of other options that are being discussed in the two-factor authentication field.

Continue reading
0 Comments

It’s Imperative that You Use Correct KVM Switches

b2ap3_thumbnail_kvm_switch_400.jpgYour company's IT infrastructure is much like a puzzle. There are many different pieces that make it up, and each piece is needed for the entire network to work properly. One piece of equipment that often gets overlooked is the KVM switch. Here are three tips on finding the right KVM for your business.

Continue reading
0 Comments

“Zero Trust” Network Security: Only Trust Data as Far as You Can Throw It!

b2ap3_thumbnail_zero_trust_400.jpgWhen it feels like everybody is out to get you, there's only one way to survive: Trust nobody. You may not have too many physical enemies ready to jump you, but there's an army of hackers wanting to breach your company's database. One of the securest ways to keep your company's information safe is to implement a "zero trust" network security model.

Continue reading
0 Comments

au·dit/ noun/: a systematic review or assessment of something

b2ap3_thumbnail_it_audit_400.jpgAre you confident that your company's network is 100 percent secure? The best way to answer "yes" to this question is with a network audit. This is a technical procedure where IT professionals analyze every nook and cranny of your system, looking for every possible vulnerability. No matter what the situation is with your company's IT management, a network audit is worth doing.

Recent comment in this post
Mira Campos
All the register companies are using the official audit software and this software is not operating with anyone. Some trail versio... Read More
Monday, 10 February 2020 04:42
Continue reading
1 Comment

Don’t Overlook the Mobile Devices Accessing Your Network

b2ap3_thumbnail_mobile_overlooked_400.jpgThe number of employees using their personal devices for work purposes (BYOD) continues to increase rapidly. According to Juniper Research, BYOD will account for over one-third of all mobile devices being used within the next few years. Not adjusting procedures to accommodate for this trend can leave your company's sensitive information vulnerable.

Continue reading
0 Comments

Sign Up for Our Newsletter

captcharefresh

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Software Business Computing Google Business Miscellaneous Workplace Tips Windows 10 Computer Backup Efficiency Innovation Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing User Tips Communication IT Support Business Management VoIP Server Network Data Quick Tips Smartphone Virtualization Email Holiday Going Green Save Money Business Continuity Remote Computing Mobile Device Management Operating System Saving Money Social Media Upgrade Apps Disaster Recovery Alert Office Android Chrome Small Business Best Practice Antivirus Employer-Employee Relationship Ransomware The Internet of Things Big Data Managed Service Provider Mobility Microsoft Office Social WiFi Application Facebook Identity Theft Browser Lithium-ion battery Current Events Printer Government Information Technology Spam BYOD Bandwidth Unified Threat Management Hacking Tablet Passwords Law Enforcement Office Tips Analytics History Saving Time Search Gmail Password Money Wireless Data Management Hard Drives Streaming Media Maintenance Education Fraud User Error communications Work/Life Balance Computers Disaster Telephone Systems Humor Avoiding Downtime Phone System Encryption Router Recovery Apple Network Security Automation Remote Monitoring Tech Support Gadgets Smartphones intranet Users Net Neutrality USB Firewall iPhone Collaboration Laptop Administration Online Currency Transportation Shortcut Business Intelligence Managed IT Services Content Filtering Internet Exlporer Biometrics Point of Sale PowerPoint Social Engineering Customer Service Cost Management Telephony Retail Virtual Reality BDR Wi-Fi Google Drive Entertainment DDoS Flexibility VPN Benefits Mobile Office App Cybercrime Risk Management IT Solutions Office 365 Fax Server Private Cloud Managing Stress IT Consultant Wireless Technology Data Loss Outlook Printer Server Update Wearable Technology Personal Information Proactive IT Marketing Budget Meetings Display Programming Hosted Solution Automobile Compliance Science Cleaning End of Support Running Cable Phishing Inbound Marketing Worker Commute Robot Save Time Emails Networking Audit Advertising Video Games Twitter OneNote RAM Data storage Hacker Human Resources Near Field Communication Website Ebay PDF Legal OneDrive Uninterrupted Power Supply CPU Keyboard Amazon Bring Your Own Device Blogging Text Messaging Paperless Office Computer Accessories Bloatware Workplace Internet of Things Politics Slow Applications Hiring/Firing Smart Phones IT consulting Artificial Intelligence Distributed Denial of Service Scalability Miscelllaneous Mouse Sports Experience Touchpad Branding Windows 8 eWaste How To HIPAA Network Congestion Travel Music Operating Sysytem Regulations WIndows 7 Vendor Management ISP Television Storage Two-factor Authentication 3D Printing Files Books Bluetooth Computing Trending Black Market Customer Relationship Management Chromecast Electronic Medical Records Cameras SharePoint HaaS Prodcuctivity User Instant Messaging Data Theft Excel Online Backup Administrator Safety Reputation Teamwork Best Available Battery CloudSync Presentation Access Emergency

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code