Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: Hackers Posing as IT Support and Hijacking Computers

b2ap3_thumbnail_technology_take_400.jpgOne minute you’re browsing trusted sites on the Internet, the next, your PC freezes up and displays the dreaded blue screen of death, along with a fake tech support message. This strain of malware is duping plenty of computer users into calling the provided phone number, which only makes the situation worse.

Continue reading
0 Comments

How a Phishing Scam Works and What You Can Do to Protect Yourself

b2ap3_thumbnail_social_engineering_magnet_400.jpgMost hacking attacks are the result of a flaw or vulnerability found within the code of a program or operating system, but we rarely take into account the ones that don’t. Hackers often take advantage of the human side of hacking as well, a process known as “social engineering.” This is usually the act of conning users into handing over personal information of their own free will, and it’s surprisingly effective.

Continue reading
0 Comments

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Microsoft Productivity Hackers Malware Google Business Software Business Computing Miscellaneous Workplace Tips Windows 10 Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing Communication IT Support User Tips VoIP Business Management Email Virtualization Holiday Server Network Data Quick Tips Smartphone Apps Disaster Recovery Office Alert Going Green Save Money Remote Computing Business Continuity Mobile Device Management Operating System Social Media Saving Money Upgrade Android Chrome Small Business Mobility Microsoft Office Social Application WiFi Facebook Identity Theft Best Practice Antivirus Employer-Employee Relationship Ransomware The Internet of Things Big Data Managed Service Provider Law Enforcement Office Tips Analytics History Search Gmail Password Saving Time Browser Current Events Government Lithium-ion battery Printer Information Technology Spam Bandwidth BYOD Unified Threat Management Hacking Tablet Passwords Smartphones Users USB intranet Net Neutrality Firewall iPhone Laptop Collaboration Money Wireless Data Management Streaming Media Hard Drives Education Maintenance User Error communications Fraud Work/Life Balance Computers Disaster Telephone Systems Humor Avoiding Downtime Phone System Router Recovery Apple Encryption Network Security Automation Remote Monitoring Tech Support Gadgets Private Cloud Managing Stress Wireless Technology IT Consultant Fax Server Outlook Printer Server Data Loss Update Personal Information Wearable Technology Marketing Budget Administration Proactive IT Transportation Shortcut Business Intelligence Online Currency Managed IT Services Content Filtering Internet Exlporer Biometrics Point of Sale PowerPoint Social Engineering Customer Service Cost Management Telephony Retail Virtual Reality BDR Wi-Fi Google Drive Entertainment DDoS Flexibility Benefits Mobile Office VPN Cybercrime App Risk Management IT Solutions Office 365 Bluetooth Trending Black Market Electronic Medical Records Customer Relationship Management Computing Chromecast Cameras SharePoint HaaS User Instant Messaging Data Theft Excel Administrator Safety Prodcuctivity Reputation Teamwork Best Available CloudSync Online Backup Battery Access Emergency Presentation Meetings Compliance Science Programming Hosted Solution Automobile Cleaning Display End of Support Running Cable Phishing Inbound Marketing Worker Commute Robot Save Time Emails Networking Audit Advertising Video Games Twitter OneNote Data storage Hacker Human Resources Near Field Communication PDF Legal OneDrive Website RAM Uninterrupted Power Supply Keyboard Bring Your Own Device Ebay Text Messaging Paperless Office Computer Accessories Bloatware Amazon Workplace Blogging CPU Internet of Things Politics Applications Hiring/Firing IT consulting Artificial Intelligence Distributed Denial of Service Scalability Miscelllaneous Mouse Smart Phones Slow Sports Experience Touchpad Branding eWaste How To HIPAA Network Congestion Travel Windows 8 Music Operating Sysytem Regulations WIndows 7 ISP Television Storage Two-factor Authentication Vendor Management 3D Printing Files Books

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code