Contact us today!
(469) 567-0181
(903) 458-9400
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

4 Important Lessons Learned From Verizon’s Annual Security Report

4 Important Lessons Learned From Verizon’s Annual Security Report

Verizon has taken to publishing a compilation report analyzing data breach statistics with the help of industry partners, a report that is widely regarded as a must-read for the industry. A brief review of the latest edition’s executive summary revealed where information security vulnerabilities lie in industries worldwide and, even more helpfully, what shape those vulnerabilities took. The Data Breach Investigations Report, or DBIR, pulled no punches in outlining what kind of attacks happened in the past year, and how.

Continue reading
0 Comments

Alert: Newfound Vulnerability Proves Windows to Not Be as Secure as Previously Thought

Alert: Newfound Vulnerability Proves Windows to Not Be as Secure as Previously Thought

A vulnerability has been uncovered in all Windows systems - one that’s described as “probably the widest impact in the history of Windows.” Coined BadTunnel, the vulnerability could provide attackers a route directly past the defenses of a system to set up a man-in-the-middle style attack.

Continue reading
0 Comments

How We Know that Mark Zuckerberg Has Never Seen Spaceballs

How We Know that Mark Zuckerberg Has Never Seen Spaceballs

Twitter recently experienced a major hack where it saw 33 million user login credentials stolen. What may be more alarming than the hack itself is what the stash of stolen credentials reveal about users’ password security habits. Or, to put it more accurately, the lack thereof.

Continue reading
0 Comments

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Business Software Business Computing Google Miscellaneous Workplace Tips Windows 10 Innovation Computer Backup Efficiency Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing IT Support User Tips Communication VoIP Business Management Holiday Server Network Data Quick Tips Smartphone Virtualization Email Going Green Business Continuity Save Money Mobile Device Management Remote Computing Saving Money Operating System Social Media Upgrade Apps Disaster Recovery Alert Office Android Small Business Chrome WiFi Social Application Identity Theft Facebook Best Practice Antivirus Employer-Employee Relationship Ransomware Mobility The Internet of Things Big Data Managed Service Provider Microsoft Office Office Tips Saving Time Password Analytics History Gmail Search Lithium-ion battery Browser Printer Current Events Government BYOD Information Technology Spam Bandwidth Unified Threat Management Hacking Tablet Passwords Law Enforcement Collaboration Laptop Users USB Work/Life Balance Money Data Management Hard Drives Maintenance Streaming Media Fraud communications Education User Error Telephone Systems Computers Disaster Humor Avoiding Downtime Encryption Recovery Phone System Router Network Security Automation Remote Monitoring Apple Tech Support Wireless intranet Gadgets Net Neutrality Firewall Smartphones iPhone Update Outlook Wearable Technology Printer Server Proactive IT Wi-Fi Budget Flexibility Online Currency Marketing Shortcut Business Intelligence Transportation Administration Internet Exlporer Biometrics Content Filtering Social Engineering Telephony Customer Service Point of Sale PowerPoint Cost Management Office 365 Virtual Reality Google Drive Retail DDoS BDR VPN Entertainment Benefits Mobile Office Personal Information App Cybercrime Risk Management IT Solutions Fax Server Private Cloud Managing Stress Managed IT Services IT Consultant Wireless Technology Data Loss Excel Hacker Cameras Online Backup Administrator Reputation Data Theft Teamwork Best Available Legal Keyboard Presentation Access CloudSync Meetings Display Hosted Solution Science Politics Hiring/Firing End of Support Compliance Running Cable Programming Phishing Scalability Experience Networking Robot Advertising Inbound Marketing How To Emails Audit Music Human Resources Near Field Communication Website RAM Data storage PDF Twitter OneNote Ebay Uninterrupted Power Supply Books Amazon Blogging CPU Text Messaging OneDrive Computer Accessories Black Market Electronic Medical Records Internet of Things Bring Your Own Device Bloatware Applications Paperless Office Smart Phones IT consulting HaaS Slow Artificial Intelligence Distributed Denial of Service Workplace Mouse Instant Messaging Safety Sports Touchpad Miscelllaneous Branding Windows 8 eWaste Network Congestion Battery Emergency Operating Sysytem HIPAA WIndows 7 Vendor Management Travel Television Storage Automobile Two-factor Authentication Cleaning Regulations Files Bluetooth ISP Computing Trending 3D Printing Worker Commute Customer Relationship Management Save Time Chromecast SharePoint Prodcuctivity User Video Games

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code