Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 3 Pieces of Screen Reading Software

Tip of the Week: 3 Pieces of Screen Reading Software

Wouldn’t it be convenient if your business could have web pages or applications read out text for you so that you don’t have to? While most would consider this a luxury, these screen reading applications are an everyday occurrence to those who are blind, visually impaired, or have a learning disability. Even if you don’t have anyone in your office who needs screen reading, it can’t hurt to be prepared for a day when you might.

Continue reading

Why Small Businesses Need to Think Big When it Comes to Network Security

Why Small Businesses Need to Think Big When it Comes to Network Security

There are benefits to being a small business. Being small provides all sorts of flexibility, including the ability to make decisions quickly and without having to go through so many hoops. Plus, you have a smaller workforce, which makes for a more personal experience. However, this also leads to a rather unfortunate side-effect of believing that you’re immune to being hacked.

Continue reading
0 Comments

5 Tips for Saving Money on your IT

b2ap3_thumbnail_save-money.jpgSaving a little on your technology can go a long ways, but cutting too many corners can lead to additional problems and expensive downtime. Here are a few ways you can cut costs without creating long term issues.

Continue reading
0 Comments

Slow Computer? Increase your memory to boost computer Speeds

b2ap3_thumbnail_computer-memory.jpgSometimes when your workstation feels bogged down, a relatively cheap and simply hardware update can make a huge difference in performance. Adding more RAM (Random Access Memory, often just referred to as memory) can be a game changer for your bogged down PC.

Continue reading
0 Comments

What is your Identity Worth to You?

b2ap3_thumbnail_identity.jpgYour identity has quite a lot of value, especially in the wrong hands. Security firm ZoneAlarm put together some numbers in 2011 concerning identity fraud, and it even shocked us. Let's talk about a few of these statistics and what it means.

Continue reading
0 Comments

Disaster Recovery and Why it Matters to Texas Businesses

b2ap3_thumbnail_disaster-recovery.jpgWhen you mention the term 'disaster recovery,' most people think about the big ground-shattering events like earthquakes, fires, floods, tropical storms, etc. While these natural events are certainly disasters and devastating in their own right, smaller things can constitute as a disaster for your business, and they aren't seasonal.

Continue reading
0 Comments

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Software Business Computing Google Business Miscellaneous Workplace Tips Windows 10 Innovation Computer Backup Efficiency Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing IT Support Communication User Tips Business Management VoIP Server Network Smartphone Data Quick Tips Email Holiday Virtualization Save Money Remote Computing Going Green Operating System Business Continuity Social Media Mobile Device Management Upgrade Saving Money Office Disaster Recovery Apps Alert Chrome Small Business Android Identity Theft Application Antivirus Best Practice The Internet of Things Employer-Employee Relationship Mobility Ransomware Big Data Managed Service Provider Microsoft Office Social Facebook WiFi Password Lithium-ion battery Printer Information Technology Spam Bandwidth Unified Threat Management Hacking BYOD Tablet Passwords Analytics History Search Gmail Browser Current Events Law Enforcement Saving Time Government Office Tips User Error Computers Data Management Disaster Hard Drives Money Maintenance Fraud Avoiding Downtime communications Phone System Router Telephone Systems Apple Humor Encryption Gadgets Smartphones Recovery Users USB Remote Monitoring Wireless Network Security Tech Support Automation intranet Net Neutrality Firewall iPhone Work/Life Balance Collaboration Laptop Streaming Media Education Point of Sale Flexibility PowerPoint Cost Management Online Currency Budget Retail Business Intelligence BDR Transportation Shortcut Entertainment Internet Exlporer Biometrics Social Engineering Mobile Office Office 365 Telephony Customer Service Virtual Reality VPN Google Drive DDoS IT Solutions Benefits Personal Information App Outlook Printer Server Cybercrime Risk Management Managed IT Services IT Consultant Fax Server Data Loss Marketing Managing Stress Private Cloud Wireless Technology Administration Wearable Technology Update Content Filtering Wi-Fi Proactive IT Teamwork Emails Best Available Audit Keyboard Reputation Display Presentation OneNote Politics Access Twitter Meetings Hiring/Firing Scalability Hosted Solution Science OneDrive Experience End of Support Running Cable Phishing Bring Your Own Device How To Paperless Office Networking Workplace Music Robot Advertising Website RAM Ebay Miscelllaneous Human Resources Near Field Communication Books Data storage PDF Blogging CPU Amazon Black Market Uninterrupted Power Supply HIPAA Travel Electronic Medical Records HaaS Text Messaging Slow Regulations Computer Accessories Smart Phones ISP Instant Messaging Internet of Things Bloatware IT consulting Safety 3D Printing Applications Artificial Intelligence Windows 8 Distributed Denial of Service Mouse Battery Sports Branding Emergency Touchpad Vendor Management eWaste Cameras Network Congestion Automobile Data Theft WIndows 7 Cleaning Operating Sysytem Television Storage Computing Worker Commute Files Two-factor Authentication CloudSync Bluetooth Save Time Video Games Trending Prodcuctivity Programming Chromecast Customer Relationship Management Compliance SharePoint Online Backup User Hacker Legal Excel Administrator Inbound Marketing

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code