Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Follow this Security Checklist to Prevent a Hack Attack

b2ap3_thumbnail_use_checklists_400.jpgNetwork security entails a ton of different procedures, and it can be easy to lose track of what you’ve already implemented, and what still needs to be done. Instead of worrying about keeping your business’s confidential data safe, know with certainty that it’s as secure as possible by following our security checklist.

Continue reading
0 Comments

Is Online Pornography a Problem for Your Business?

b2ap3_thumbnail_content_filtering_400.jpgThe topic of online pornography can be rather uncomfortable to discuss, but it’s an issue that business owners need to be aware of; especially considering that 70 percent of all online porn access happens during business hours! Whoa. This statistic has some naughty implications for what your employees may be doing on company time.

Continue reading
0 Comments

“Zero Trust” Network Security: Only Trust Data as Far as You Can Throw It!

b2ap3_thumbnail_zero_trust_400.jpgWhen it feels like everybody is out to get you, there's only one way to survive: Trust nobody. You may not have too many physical enemies ready to jump you, but there's an army of hackers wanting to breach your company's database. One of the securest ways to keep your company's information safe is to implement a "zero trust" network security model.

Continue reading
0 Comments

Unified Threat Management: Ultimate Protection for a New Era

b2ap3_thumbnail_data_and_network_security_400.jpgEverything changes in due time. Computers grow less secure, malware grows more sophisticated, and hackers' methods change. According to Processor magazine, 80 to 90 percent of attacks are targeted at devices rather than networks and servers. Just like the weakest link in a fence, all it takes is one weak point for a hacker to take down your entire network.

Continue reading
0 Comments

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Software Business Computing Google Business Miscellaneous Workplace Tips Windows 10 Innovation Computer Backup Efficiency Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing IT Support Communication User Tips Business Management VoIP Server Network Smartphone Data Quick Tips Email Holiday Virtualization Save Money Remote Computing Going Green Operating System Business Continuity Social Media Mobile Device Management Upgrade Saving Money Office Disaster Recovery Apps Alert Chrome Small Business Android Identity Theft Application Antivirus Best Practice The Internet of Things Employer-Employee Relationship Mobility Ransomware Big Data Managed Service Provider Microsoft Office Social Facebook WiFi Password Lithium-ion battery Printer Information Technology Spam Bandwidth Unified Threat Management Hacking BYOD Tablet Passwords Analytics History Search Gmail Browser Current Events Law Enforcement Saving Time Government Office Tips User Error Computers Data Management Disaster Hard Drives Money Maintenance Fraud Avoiding Downtime communications Phone System Router Telephone Systems Apple Humor Encryption Gadgets Smartphones Recovery Users USB Remote Monitoring Wireless Network Security Tech Support Automation intranet Net Neutrality Firewall iPhone Work/Life Balance Collaboration Laptop Streaming Media Education Point of Sale Flexibility PowerPoint Cost Management Online Currency Budget Retail Business Intelligence BDR Transportation Shortcut Entertainment Internet Exlporer Biometrics Social Engineering Mobile Office Office 365 Telephony Customer Service Virtual Reality VPN Google Drive DDoS IT Solutions Benefits Personal Information App Outlook Printer Server Cybercrime Risk Management Managed IT Services IT Consultant Fax Server Data Loss Marketing Managing Stress Private Cloud Wireless Technology Administration Wearable Technology Update Content Filtering Wi-Fi Proactive IT Teamwork Emails Best Available Audit Keyboard Reputation Display Presentation OneNote Politics Access Twitter Meetings Hiring/Firing Scalability Hosted Solution Science OneDrive Experience End of Support Running Cable Phishing Bring Your Own Device How To Paperless Office Networking Workplace Music Robot Advertising Website RAM Ebay Miscelllaneous Human Resources Near Field Communication Books Data storage PDF Blogging CPU Amazon Black Market Uninterrupted Power Supply HIPAA Travel Electronic Medical Records HaaS Text Messaging Slow Regulations Computer Accessories Smart Phones ISP Instant Messaging Internet of Things Bloatware IT consulting Safety 3D Printing Applications Artificial Intelligence Windows 8 Distributed Denial of Service Mouse Battery Sports Branding Emergency Touchpad Vendor Management eWaste Cameras Network Congestion Automobile Data Theft WIndows 7 Cleaning Operating Sysytem Television Storage Computing Worker Commute Files Two-factor Authentication CloudSync Bluetooth Save Time Video Games Trending Prodcuctivity Programming Chromecast Customer Relationship Management Compliance SharePoint Online Backup User Hacker Legal Excel Administrator Inbound Marketing

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code