Contact us today!
(469) 567-0181
(903) 458-9400
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: Hackers Posing as IT Support and Hijacking Computers

b2ap3_thumbnail_technology_take_400.jpgOne minute you’re browsing trusted sites on the Internet, the next, your PC freezes up and displays the dreaded blue screen of death, along with a fake tech support message. This strain of malware is duping plenty of computer users into calling the provided phone number, which only makes the situation worse.

Continue reading
0 Comments

How a Phishing Scam Works and What You Can Do to Protect Yourself

b2ap3_thumbnail_social_engineering_magnet_400.jpgMost hacking attacks are the result of a flaw or vulnerability found within the code of a program or operating system, but we rarely take into account the ones that don’t. Hackers often take advantage of the human side of hacking as well, a process known as “social engineering.” This is usually the act of conning users into handing over personal information of their own free will, and it’s surprisingly effective.

Continue reading
0 Comments

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Business Software Business Computing Google Miscellaneous Workplace Tips Windows 10 Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing Communication IT Support User Tips VoIP Business Management Email Holiday Server Network Data Quick Tips Smartphone Virtualization Office Going Green Business Continuity Mobile Device Management Save Money Remote Computing Saving Money Operating System Apps Social Media Disaster Recovery Upgrade Alert Android Small Business Chrome Managed Service Provider Microsoft Office Best Practice WiFi Identity Theft Social Employer-Employee Relationship Ransomware Facebook Antivirus Mobility The Internet of Things Application Big Data Passwords Saving Time History Analytics Search Lithium-ion battery Gmail Printer Browser Current Events Government BYOD Information Technology Spam Bandwidth Unified Threat Management Law Enforcement Office Tips Hacking Tablet Password Net Neutrality Firewall iPhone Gadgets Collaboration Laptop Smartphones Users USB communications Work/Life Balance Telephone Systems Hard Drives Maintenance Humor Fraud Streaming Media Recovery Education User Error Network Security Automation Disaster Computers Encryption Avoiding Downtime Phone System Remote Monitoring Router Tech Support Apple Money Wireless Data Management intranet Data Loss Transportation Shortcut Business Intelligence Managed IT Services Wearable Technology Internet Exlporer Biometrics Proactive IT Outlook Social Engineering Customer Service Printer Server Telephony Online Currency Wi-Fi Virtual Reality Google Drive Marketing Administration DDoS Flexibility Benefits Content Filtering Point of Sale PowerPoint Cost Management Cybercrime Risk Management VPN Retail Office 365 BDR Private Cloud Entertainment Managing Stress Wireless Technology App Mobile Office Update Personal Information Budget IT Consultant Fax Server IT Solutions Science ISP Hosted Solution Automobile 3D Printing Cleaning Prodcuctivity End of Support Running Cable Phishing Online Backup Worker Commute Robot Save Time Networking Advertising Video Games Cameras Data Theft Data storage Hacker Human Resources Near Field Communication Display PDF Legal Uninterrupted Power Supply CloudSync Keyboard Computer Accessories Text Messaging Internet of Things Politics Bloatware Compliance Programming Applications Hiring/Firing IT consulting Mouse Artificial Intelligence Distributed Denial of Service Scalability Sports Experience Inbound Marketing Website RAM Audit Touchpad Branding Emails Ebay Network Congestion eWaste How To Music Amazon Twitter Blogging OneNote CPU Operating Sysytem WIndows 7 Storage Television Files Books Two-factor Authentication Smart Phones OneDrive Slow Bring Your Own Device Bluetooth Paperless Office Trending Black Market Chromecast Electronic Medical Records Customer Relationship Management Windows 8 Workplace SharePoint HaaS User Excel Miscelllaneous Instant Messaging Administrator Safety Vendor Management Reputation Teamwork Best Available HIPAA Battery Access Emergency Computing Travel Presentation Meetings Regulations

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code