Contact us today!
(469) 567-0181
(903) 458-9400
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: Hackers Posing as IT Support and Hijacking Computers

b2ap3_thumbnail_technology_take_400.jpgOne minute you’re browsing trusted sites on the Internet, the next, your PC freezes up and displays the dreaded blue screen of death, along with a fake tech support message. This strain of malware is duping plenty of computer users into calling the provided phone number, which only makes the situation worse.

Continue reading

How a Phishing Scam Works and What You Can Do to Protect Yourself

b2ap3_thumbnail_social_engineering_magnet_400.jpgMost hacking attacks are the result of a flaw or vulnerability found within the code of a program or operating system, but we rarely take into account the ones that don’t. Hackers often take advantage of the human side of hacking as well, a process known as “social engineering.” This is usually the act of conning users into handing over personal information of their own free will, and it’s surprisingly effective.

Continue reading

Sign Up for Our Newsletter


Powered by ChronoForms -

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Microsoft Productivity Hackers Malware Business Software Business Computing Google Windows 10 Miscellaneous Workplace Tips Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware Health Mobile Devices Mobile Computing IT Services User Tips IT Support Communication VoIP Business Management Network Data Quick Tips Virtualization Smartphone Email Server Holiday Business Continuity Mobile Device Management Saving Money Save Money Apps Disaster Recovery Remote Computing Alert Operating System Social Media Upgrade Office Going Green Small Business Android Chrome Social Mobility Application Facebook Best Practice Employer-Employee Relationship Ransomware The Internet of Things WiFi Big Data Identity Theft Managed Service Provider Microsoft Office Antivirus Office Tips Analytics History Search Gmail BYOD Password Browser Current Events Government Information Technology Spam Bandwidth Unified Threat Management Hacking Tablet Saving Time Lithium-ion battery Passwords Printer Law Enforcement Money Data Management Streaming Media Encryption Education User Error communications Wireless Remote Monitoring Computers Tech Support Disaster Telephone Systems Humor intranet Work/Life Balance Net Neutrality Firewall Avoiding Downtime Phone System iPhone Router Laptop Collaboration Recovery Apple Network Security Automation Hard Drives Gadgets Maintenance Smartphones Users USB Fraud Marketing Budget Administration VPN Transportation Shortcut Business Intelligence Content Filtering Personal Information Internet Exlporer Biometrics Point of Sale App PowerPoint Social Engineering Customer Service Cost Management Telephony Retail Managed IT Services Virtual Reality BDR Google Drive Entertainment IT Consultant Fax Server DDoS Data Loss Benefits Mobile Office Wi-Fi Wearable Technology Proactive IT Flexibility Cybercrime Risk Management IT Solutions Online Currency Private Cloud Managing Stress Wireless Technology Outlook Office 365 Printer Server Update Books Website RAM Administrator Reputation Teamwork Best Available Ebay Black Market CloudSync Access Electronic Medical Records Amazon Presentation Blogging CPU Meetings HaaS Compliance Science Instant Messaging Programming Hosted Solution Safety Smart Phones Slow End of Support Running Cable Phishing Inbound Marketing Battery Robot Emails Networking Emergency Audit Windows 8 Advertising Twitter Automobile OneNote Data storage Human Resources Cleaning Near Field Communication Vendor Management PDF Worker Commute OneDrive Uninterrupted Power Supply Save Time Computing Bring Your Own Device Text Messaging Paperless Office Computer Accessories Video Games Bloatware Workplace Internet of Things Applications Hacker Prodcuctivity IT consulting Artificial Intelligence Distributed Denial of Service Miscelllaneous Mouse Legal Online Backup Sports Touchpad Branding Keyboard eWaste HIPAA Network Congestion Travel Politics Operating Sysytem Regulations Hiring/Firing WIndows 7 Display Scalability ISP Television Storage Two-factor Authentication Experience 3D Printing Files Bluetooth How To Trending Customer Relationship Management Music Chromecast Cameras SharePoint User Data Theft Excel

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...