Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How a Phishing Scam Works and What You Can Do to Protect Yourself

b2ap3_thumbnail_social_engineering_magnet_400.jpgMost hacking attacks are the result of a flaw or vulnerability found within the code of a program or operating system, but we rarely take into account the ones that don’t. Hackers often take advantage of the human side of hacking as well, a process known as “social engineering.” This is usually the act of conning users into handing over personal information of their own free will, and it’s surprisingly effective.

Continue reading

Sign Up for Our Newsletter

Powered by ChronoForms -

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Business Software Business Computing Google Miscellaneous Workplace Tips Windows 10 Innovation Computer Backup Efficiency Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing Communication IT Support User Tips VoIP Business Management Email Holiday Server Network Data Quick Tips Smartphone Virtualization Office Going Green Business Continuity Save Money Mobile Device Management Remote Computing Saving Money Operating System Apps Social Media Disaster Recovery Upgrade Alert Android Small Business Chrome Microsoft Office WiFi Identity Theft Social Facebook Antivirus Application Best Practice Employer-Employee Relationship Ransomware The Internet of Things Mobility Big Data Managed Service Provider Saving Time Analytics History Search Gmail Lithium-ion battery Law Enforcement Printer Office Tips Browser Current Events Password Government BYOD Information Technology Spam Bandwidth Unified Threat Management Hacking Tablet Passwords Collaboration Laptop Smartphones Automation Users USB Wireless Hard Drives Maintenance Fraud Streaming Media Work/Life Balance Money Data Management Education User Error Computers Disaster communications Encryption Telephone Systems Avoiding Downtime Phone System Humor Router Remote Monitoring Tech Support Apple intranet Recovery Net Neutrality Firewall Network Security Gadgets iPhone Cybercrime Risk Management Wearable Technology Personal Information Proactive IT Outlook Private Cloud Managing Stress Printer Server Wireless Technology Online Currency Update Marketing Managed IT Services Administration Budget Content Filtering Point of Sale Shortcut PowerPoint Business Intelligence Transportation Wi-Fi Cost Management Internet Exlporer Flexibility Retail VPN Biometrics Social Engineering BDR Telephony Entertainment Customer Service Mobile Office App Virtual Reality Google Drive DDoS Office 365 Benefits Fax Server IT Consultant IT Solutions Data Loss Instant Messaging Safety WIndows 7 Online Backup Operating Sysytem Television Storage Files Cameras Battery Two-factor Authentication Emergency Bluetooth Data Theft Trending Display Customer Relationship Management Chromecast Automobile Cleaning SharePoint CloudSync User Excel Administrator Worker Commute Reputation Save Time Teamwork Compliance Best Available Programming Video Games Presentation Access Hacker Meetings Inbound Marketing Website RAM Hosted Solution Emails Legal Science Audit Ebay End of Support Keyboard Running Cable Twitter Amazon Phishing OneNote Blogging CPU Networking Robot Politics Slow Advertising Hiring/Firing Smart Phones OneDrive Scalability Bring Your Own Device Human Resources Paperless Office Near Field Communication Data storage Experience PDF Workplace Windows 8 Uninterrupted Power Supply How To Miscelllaneous Music Text Messaging Computer Accessories Vendor Management Internet of Things Bloatware Books HIPAA IT consulting Applications Artificial Intelligence Distributed Denial of Service Travel Computing Mouse Sports Regulations Black Market Electronic Medical Records Branding ISP Touchpad eWaste HaaS Prodcuctivity Network Congestion 3D Printing

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...