Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How a Phishing Scam Works and What You Can Do to Protect Yourself

b2ap3_thumbnail_social_engineering_magnet_400.jpgMost hacking attacks are the result of a flaw or vulnerability found within the code of a program or operating system, but we rarely take into account the ones that don’t. Hackers often take advantage of the human side of hacking as well, a process known as “social engineering.” This is usually the act of conning users into handing over personal information of their own free will, and it’s surprisingly effective.

Continue reading

Sign Up for Our Newsletter

Powered by ChronoForms -

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Software Business Computing Google Business Miscellaneous Workplace Tips Windows 10 Backup Efficiency Innovation Computer Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing User Tips Communication IT Support Business Management VoIP Server Network Data Quick Tips Smartphone Email Virtualization Holiday Going Green Save Money Remote Computing Business Continuity Mobile Device Management Operating System Saving Money Social Media Upgrade Disaster Recovery Apps Office Alert Chrome Small Business Android Employer-Employee Relationship Antivirus Mobility Ransomware The Internet of Things Big Data Managed Service Provider Microsoft Office Application Social Facebook WiFi Best Practice Identity Theft Printer Information Technology Spam Bandwidth BYOD Unified Threat Management Hacking Tablet Passwords Law Enforcement Office Tips Password Analytics History Search Gmail Saving Time Browser Current Events Lithium-ion battery Government Telephone Systems User Error Fraud Humor Computers Disaster Recovery Avoiding Downtime Phone System Network Security Router Automation Wireless Encryption Apple Remote Monitoring Gadgets Tech Support Smartphones Work/Life Balance Users USB intranet Net Neutrality Firewall iPhone Money Data Management Collaboration Laptop Streaming Media communications Maintenance Education Hard Drives Office 365 Point of Sale Virtual Reality PowerPoint Google Drive Cost Management DDoS Retail BDR Benefits Entertainment Personal Information Mobile Office Cybercrime VPN Risk Management Managed IT Services Private Cloud Managing Stress Wireless Technology App IT Solutions Update IT Consultant Fax Server Wi-Fi Outlook Data Loss Printer Server Budget Flexibility Transportation Shortcut Wearable Technology Business Intelligence Marketing Internet Exlporer Proactive IT Administration Biometrics Social Engineering Telephony Customer Service Online Currency Content Filtering Emails Audit PDF Uninterrupted Power Supply Books Twitter OneNote Computer Accessories Black Market Text Messaging Internet of Things Bloatware Electronic Medical Records Website RAM OneDrive HaaS Applications IT consulting Mouse Ebay Bring Your Own Device Instant Messaging Artificial Intelligence Distributed Denial of Service Sports Paperless Office Safety Blogging CPU Workplace Touchpad Branding Amazon Network Congestion Battery eWaste Miscelllaneous Emergency Slow Operating Sysytem Smart Phones WIndows 7 Storage Automobile Television Files Two-factor Authentication HIPAA Cleaning Windows 8 Travel Bluetooth Regulations Worker Commute Trending ISP Chromecast Customer Relationship Management Save Time Vendor Management Video Games 3D Printing SharePoint User Excel Administrator Hacker Legal Reputation Teamwork Computing Best Available Cameras Access Presentation Data Theft Keyboard Meetings Prodcuctivity Hosted Solution Science Politics Online Backup CloudSync Hiring/Firing Phishing Scalability End of Support Running Cable Experience Programming Robot Networking Compliance Display How To Advertising Music Inbound Marketing Data storage Human Resources Near Field Communication

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...