Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

4 Important Lessons Learned From Verizon’s Annual Security Report

4 Important Lessons Learned From Verizon’s Annual Security Report

Verizon has taken to publishing a compilation report analyzing data breach statistics with the help of industry partners, a report that is widely regarded as a must-read for the industry. A brief review of the latest edition’s executive summary revealed where information security vulnerabilities lie in industries worldwide and, even more helpfully, what shape those vulnerabilities took. The Data Breach Investigations Report, or DBIR, pulled no punches in outlining what kind of attacks happened in the past year, and how.

Continue reading
0 Comments

Alert: Newfound Vulnerability Proves Windows to Not Be as Secure as Previously Thought

Alert: Newfound Vulnerability Proves Windows to Not Be as Secure as Previously Thought

A vulnerability has been uncovered in all Windows systems - one that’s described as “probably the widest impact in the history of Windows.” Coined BadTunnel, the vulnerability could provide attackers a route directly past the defenses of a system to set up a man-in-the-middle style attack.

Continue reading
0 Comments

How We Know that Mark Zuckerberg Has Never Seen Spaceballs

How We Know that Mark Zuckerberg Has Never Seen Spaceballs

Twitter recently experienced a major hack where it saw 33 million user login credentials stolen. What may be more alarming than the hack itself is what the stash of stolen credentials reveal about users’ password security habits. Or, to put it more accurately, the lack thereof.

Continue reading
0 Comments

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Microsoft Productivity Hackers Malware Software Business Computing Business Google Windows 10 Miscellaneous Workplace Tips Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware Mobile Devices Mobile Computing IT Services Health Communication User Tips IT Support VoIP Business Management Network Data Email Quick Tips Holiday Virtualization Server Smartphone Upgrade Business Continuity Mobile Device Management Office Saving Money Apps Disaster Recovery Alert Save Money Remote Computing Operating System Going Green Social Media Small Business Android Chrome Big Data Managed Service Provider Microsoft Office Best Practice Mobility Social Employer-Employee Relationship Ransomware Facebook WiFi Identity Theft Antivirus The Internet of Things Application BYOD Passwords Analytics History Search Gmail Browser Current Events Government Saving Time Information Technology Spam Lithium-ion battery Bandwidth Printer Law Enforcement Unified Threat Management Office Tips Hacking Tablet Password Money Data Management Gadgets Smartphones Users USB Encryption communications Remote Monitoring Telephone Systems Tech Support Humor Streaming Media intranet Wireless Net Neutrality Firewall Education iPhone Recovery Laptop Collaboration Network Security User Error Automation Computers Disaster Work/Life Balance Hard Drives Maintenance Avoiding Downtime Phone System Router Fraud Apple Budget IT Solutions Shortcut Business Intelligence Transportation Office 365 VPN Internet Exlporer Biometrics Social Engineering Outlook Printer Server Telephony Customer Service App Virtual Reality Marketing Google Drive Personal Information DDoS Administration IT Consultant Fax Server Benefits Data Loss Content Filtering Managed IT Services Point of Sale Wearable Technology PowerPoint Cost Management Cybercrime Risk Management Proactive IT Retail BDR Private Cloud Entertainment Managing Stress Online Currency Wi-Fi Wireless Technology Flexibility Mobile Office Update Travel Presentation Ebay Access How To Meetings Regulations ISP Amazon Music Blogging Hosted Solution CPU Science 3D Printing End of Support Running Cable Phishing Smart Phones Books Slow Networking Robot Advertising Black Market Cameras Electronic Medical Records Windows 8 Data Theft Human Resources Near Field Communication Data storage HaaS PDF Instant Messaging Safety Vendor Management Uninterrupted Power Supply CloudSync Text Messaging Battery Computer Accessories Programming Computing Emergency Internet of Things Bloatware Compliance IT consulting Applications Artificial Intelligence Automobile Distributed Denial of Service Mouse Prodcuctivity Cleaning Sports Inbound Marketing Branding Emails Audit Touchpad Worker Commute eWaste Online Backup Network Congestion Twitter OneNote Save Time Operating Sysytem Video Games WIndows 7 Television Storage Two-factor Authentication OneDrive Hacker Display Files Legal Bluetooth Bring Your Own Device Trending Paperless Office Customer Relationship Management Workplace Keyboard Chromecast SharePoint User Politics Excel Miscelllaneous Hiring/Firing Administrator Reputation Scalability Teamwork Best Available Experience Website RAM HIPAA

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code