Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Follow this Security Checklist to Prevent a Hack Attack

b2ap3_thumbnail_use_checklists_400.jpgNetwork security entails a ton of different procedures, and it can be easy to lose track of what you’ve already implemented, and what still needs to be done. Instead of worrying about keeping your business’s confidential data safe, know with certainty that it’s as secure as possible by following our security checklist.

Continue reading
0 Comments

Is Online Pornography a Problem for Your Business?

b2ap3_thumbnail_content_filtering_400.jpgThe topic of online pornography can be rather uncomfortable to discuss, but it’s an issue that business owners need to be aware of; especially considering that 70 percent of all online porn access happens during business hours! Whoa. This statistic has some naughty implications for what your employees may be doing on company time.

Continue reading
0 Comments

“Zero Trust” Network Security: Only Trust Data as Far as You Can Throw It!

b2ap3_thumbnail_zero_trust_400.jpgWhen it feels like everybody is out to get you, there's only one way to survive: Trust nobody. You may not have too many physical enemies ready to jump you, but there's an army of hackers wanting to breach your company's database. One of the securest ways to keep your company's information safe is to implement a "zero trust" network security model.

Continue reading
0 Comments

Unified Threat Management: Ultimate Protection for a New Era

b2ap3_thumbnail_data_and_network_security_400.jpgEverything changes in due time. Computers grow less secure, malware grows more sophisticated, and hackers' methods change. According to Processor magazine, 80 to 90 percent of attacks are targeted at devices rather than networks and servers. Just like the weakest link in a fence, all it takes is one weak point for a hacker to take down your entire network.

Continue reading
0 Comments

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Business Software Business Computing Google Miscellaneous Workplace Tips Windows 10 Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing IT Support User Tips Communication VoIP Business Management Holiday Server Network Data Quick Tips Smartphone Email Virtualization Alert Going Green Save Money Remote Computing Business Continuity Mobile Device Management Operating System Saving Money Social Media Upgrade Disaster Recovery Office Apps Android Chrome Small Business Social Application WiFi Facebook Identity Theft Best Practice Antivirus Employer-Employee Relationship Ransomware The Internet of Things Big Data Managed Service Provider Microsoft Office Mobility Law Enforcement History Office Tips Analytics Search Gmail Password Saving Time Browser Current Events Government Lithium-ion battery Printer Information Technology Spam Bandwidth BYOD Unified Threat Management Hacking Tablet Passwords Users USB intranet Net Neutrality Firewall iPhone Collaboration Laptop Data Management Money Wireless Streaming Media Hard Drives Education Maintenance User Error communications Fraud Work/Life Balance Computers Disaster Telephone Systems Humor Avoiding Downtime Phone System Router Recovery Apple Encryption Network Security Automation Remote Monitoring Tech Support Gadgets Smartphones IT Consultant Fax Server Outlook Data Loss Update Printer Server Personal Information Wearable Technology Marketing Budget Administration Proactive IT Transportation Shortcut Business Intelligence Content Filtering Online Currency Managed IT Services Internet Exlporer Point of Sale Biometrics PowerPoint Social Engineering Telephony Customer Service Cost Management Retail Wi-Fi Virtual Reality BDR Google Drive Entertainment DDoS Flexibility Mobile Office Benefits VPN Cybercrime IT Solutions App Risk Management Office 365 Managing Stress Private Cloud Wireless Technology Chromecast Electronic Medical Records Customer Relationship Management Computing User Cameras SharePoint HaaS Instant Messaging Data Theft Excel Administrator Safety Prodcuctivity Best Available Reputation Teamwork Online Backup Battery CloudSync Access Emergency Presentation Meetings Hosted Solution Automobile Compliance Science Programming Display Cleaning Phishing End of Support Running Cable Worker Commute Inbound Marketing Robot Save Time Emails Networking Audit Advertising Video Games Twitter OneNote Data storage Hacker Human Resources Near Field Communication Legal PDF RAM Uninterrupted Power Supply OneDrive Website Bring Your Own Device Ebay Keyboard Paperless Office Computer Accessories Text Messaging CPU Internet of Things Politics Bloatware Amazon Workplace Blogging IT consulting Applications Hiring/Firing Distributed Denial of Service Scalability Miscelllaneous Mouse Artificial Intelligence Slow Sports Experience Smart Phones Touchpad Branding eWaste How To HIPAA Network Congestion Windows 8 Music Travel WIndows 7 Operating Sysytem Regulations Television Storage ISP Vendor Management 3D Printing Files Books Two-factor Authentication Bluetooth Trending Black Market

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code