Contact us today!
(469) 567-0181
(903) 458-9400
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 4 Ways to Get a Handle on Social Media in the Workplace

Tip of the Week: 4 Ways to Get a Handle on Social Media in the Workplace

Social media may be a great way to connect with other professionals and communicate with your friends, but it can be dangerous if you have poor posting habits. Before you share something, think twice about whether it contains any sensitive information that could be risky to yourself and your business.

Continue reading
0 Comments

For Cyber Security Month, Take Extra Care Not to Overshare

b2ap3_thumbnail_oversharing_400.jpgOctober is Cyber Security month. We want to bring attention to this very important issue affecting every person and organization connected to the Internet. When discussing cyber security, we often talk about computer viruses and malware, but these threats are only part of the cyber security equation. It’s just as important that you, your staff, and even your family, are mindful to not overshare information online that can compromise your organization’s security and personal identities.

Continue reading
0 Comments

Twitter Can Be a Valuable Business Asset

b2ap3_thumbnail_twittastic_400.jpgDespite the fact that 255 million people use Twitter, some businesses want nothing to do with it. They see it as little more than a waste of time. However, these anti-Twitter activists fail to realize that the social media outlet has an unmistakably large influence in the marketing industry. Unlike Facebook, Twitter gives you the opportunity to customize your audience to suit the precise needs of your business, and the best part of this is that it’s completely free.

Continue reading
0 Comments

One Failed Restaurant Shows Us Why it’s Vital to Be Listed Correctly on Google Places

b2ap3_thumbnail_google_places_400.jpgWhen a dining establishment goes out of business, it usually doesn’t make the news. After all, running a restaurant is a risky endeavor. However, for one Washington D.C. eatery, it’s blaming its failure a Google Places mishap, which makes you think twice about how important it is for your business to have its online information properly displayed.

Continue reading
0 Comments

Are You or Your Team a Security Threat to Your Business?

b2ap3_thumbnail_manage_your_risk_400.jpgData security should be a top priority for every business. Having good security means identifying risks. Surprisingly, some of the biggest data risks come from within. If employees aren't following your organization's data management policies, then they're your biggest threats.

Continue reading
0 Comments

Quit Avoiding Proven Technologies!

b2ap3_thumbnail_solutions_for_business_400.jpgIt's the nature of technology to take a while for the market to fully appreciate it. After it's released, there's an implementation phase where the benefits are weighed against the risks. This phase is usually a slow one, but if the technology is good, then its acceptance will be widespread and businesses will have to give excuses on why they're not using it.

Continue reading
0 Comments

The Dangerous Consequences of Posting Pics, and 3 Steps You Can Take to Protect Yourself

b2ap3_thumbnail_protect_your_likeness_400.jpgToday, almost everybody has an Internet-connected camera in their pocket. A crazy amount of photos are posted online. In fact, Facebook alone claims to have over 250 billion photos, with 350 million user images posted every day. All of these pictures are fun, but how do you ensure that only the people you want to see your photos are seeing them?

Recent comment in this post
Alica Milerum
When you have to choose the picture then you have to select the different options. For further updates you can get https://www.top... Read More
Friday, 13 December 2019 00:46
Continue reading
1 Comment

Sign Up for Our Newsletter

captcharefresh

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Business Software Business Computing Google Miscellaneous Workplace Tips Windows 10 Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing IT Support User Tips Communication VoIP Business Management Holiday Server Network Data Quick Tips Smartphone Email Virtualization Alert Going Green Save Money Remote Computing Business Continuity Mobile Device Management Operating System Social Media Saving Money Upgrade Apps Disaster Recovery Office Android Chrome Small Business Social Application WiFi Facebook Identity Theft Best Practice Antivirus Employer-Employee Relationship Ransomware The Internet of Things Big Data Managed Service Provider Mobility Microsoft Office Law Enforcement Office Tips Analytics History Gmail Search Password Saving Time Browser Current Events Government Lithium-ion battery Printer Information Technology Spam Bandwidth BYOD Unified Threat Management Hacking Tablet Passwords intranet Net Neutrality Firewall iPhone Laptop Collaboration Money Wireless Data Management Streaming Media Hard Drives Education Maintenance User Error communications Fraud Work/Life Balance Computers Disaster Telephone Systems Humor Avoiding Downtime Phone System Router Recovery Apple Encryption Network Security Automation Remote Monitoring Tech Support Gadgets Smartphones Users USB Outlook Printer Server Data Loss Update Personal Information Wearable Technology Marketing Budget Proactive IT Administration Transportation Shortcut Business Intelligence Online Currency Managed IT Services Content Filtering Internet Exlporer Biometrics Point of Sale PowerPoint Social Engineering Customer Service Cost Management Telephony Retail Virtual Reality BDR Wi-Fi Google Drive Entertainment DDoS Flexibility Benefits Mobile Office VPN Cybercrime App Risk Management IT Solutions Office 365 Private Cloud Managing Stress Wireless Technology IT Consultant Fax Server Cameras SharePoint HaaS User Data Theft Excel Instant Messaging Administrator Safety Prodcuctivity Reputation Teamwork Best Available CloudSync Online Backup Battery Access Emergency Presentation Meetings Compliance Science Programming Hosted Solution Automobile Cleaning Display End of Support Running Cable Phishing Inbound Marketing Worker Commute Robot Save Time Emails Networking Audit Advertising Video Games Twitter OneNote Data storage Hacker Human Resources Near Field Communication PDF Legal OneDrive Website RAM Uninterrupted Power Supply Keyboard Bring Your Own Device Ebay Text Messaging Paperless Office Computer Accessories Bloatware Amazon Workplace Blogging CPU Internet of Things Politics Applications Hiring/Firing IT consulting Artificial Intelligence Distributed Denial of Service Scalability Miscelllaneous Mouse Smart Phones Slow Sports Experience Touchpad Branding eWaste How To HIPAA Network Congestion Travel Windows 8 Music Operating Sysytem Regulations WIndows 7 ISP Television Storage Two-factor Authentication Vendor Management 3D Printing Files Books Bluetooth Trending Black Market Chromecast Electronic Medical Records Customer Relationship Management Computing

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code