Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

4 Important Lessons Learned From Verizon’s Annual Security Report

4 Important Lessons Learned From Verizon’s Annual Security Report

Verizon has taken to publishing a compilation report analyzing data breach statistics with the help of industry partners, a report that is widely regarded as a must-read for the industry. A brief review of the latest edition’s executive summary revealed where information security vulnerabilities lie in industries worldwide and, even more helpfully, what shape those vulnerabilities took. The Data Breach Investigations Report, or DBIR, pulled no punches in outlining what kind of attacks happened in the past year, and how.

Continue reading
0 Comments

Alert: Newfound Vulnerability Proves Windows to Not Be as Secure as Previously Thought

Alert: Newfound Vulnerability Proves Windows to Not Be as Secure as Previously Thought

A vulnerability has been uncovered in all Windows systems - one that’s described as “probably the widest impact in the history of Windows.” Coined BadTunnel, the vulnerability could provide attackers a route directly past the defenses of a system to set up a man-in-the-middle style attack.

Continue reading
0 Comments

How We Know that Mark Zuckerberg Has Never Seen Spaceballs

How We Know that Mark Zuckerberg Has Never Seen Spaceballs

Twitter recently experienced a major hack where it saw 33 million user login credentials stolen. What may be more alarming than the hack itself is what the stash of stolen credentials reveal about users’ password security habits. Or, to put it more accurately, the lack thereof.

Continue reading
0 Comments

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Software Business Business Computing Google Miscellaneous Workplace Tips Windows 10 Innovation Computer Backup Efficiency Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing IT Support Communication User Tips Business Management VoIP Smartphone Server Network Email Data Holiday Quick Tips Virtualization Remote Computing Operating System Social Media Going Green Upgrade Business Continuity Mobile Device Management Office Saving Money Apps Disaster Recovery Alert Save Money Chrome Small Business Android Identity Theft The Internet of Things Best Practice Antivirus Big Data Employer-Employee Relationship Managed Service Provider Ransomware Microsoft Office Social Facebook Mobility WiFi Application Bandwidth Lithium-ion battery Unified Threat Management Printer Hacking Tablet BYOD Passwords Analytics History Search Gmail Browser Current Events Government Law Enforcement Office Tips Saving Time Information Technology Password Spam Money Data Management Avoiding Downtime Phone System Wireless Hard Drives Maintenance Router Apple Fraud communications Telephone Systems Work/Life Balance Gadgets Smartphones Humor USB Users Encryption Recovery Network Security Remote Monitoring Automation Tech Support Streaming Media Education intranet Net Neutrality Firewall User Error iPhone Collaboration Laptop Computers Disaster Budget Entertainment Personal Information Online Currency Shortcut Business Intelligence Mobile Office Transportation Internet Exlporer Managed IT Services Biometrics Social Engineering Telephony Customer Service IT Solutions Virtual Reality Google Drive DDoS Wi-Fi VPN Benefits Flexibility Outlook Printer Server App Marketing Cybercrime Risk Management Administration Private Cloud Fax Server Office 365 Managing Stress Content Filtering IT Consultant Wireless Technology Point of Sale Data Loss PowerPoint Cost Management Update Wearable Technology Retail Proactive IT BDR Presentation Bring Your Own Device Access Meetings Battery Paperless Office Display Workplace Hosted Solution Emergency Science End of Support Running Cable Automobile Phishing Miscelllaneous Cleaning Networking Robot Advertising Worker Commute HIPAA Save Time Travel Human Resources Regulations Video Games Near Field Communication Website Data storage RAM PDF ISP Ebay 3D Printing Uninterrupted Power Supply Hacker Legal Amazon Blogging CPU Text Messaging Computer Accessories Internet of Things Keyboard Bloatware Cameras IT consulting Smart Phones Applications Slow Artificial Intelligence Distributed Denial of Service Politics Mouse Data Theft Sports Hiring/Firing Branding Scalability Windows 8 Touchpad eWaste Experience Network Congestion CloudSync Operating Sysytem How To WIndows 7 Vendor Management Programming Television Music Storage Compliance Two-factor Authentication Files Bluetooth Computing Trending Books Inbound Marketing Customer Relationship Management Emails Audit Chromecast SharePoint Black Market User Prodcuctivity OneNote Electronic Medical Records Excel Twitter HaaS Administrator Online Backup Reputation Teamwork Instant Messaging Best Available OneDrive Safety

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code