Contact us today!
(469) 567-0181
(903) 458-9400
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Follow this Security Checklist to Prevent a Hack Attack

b2ap3_thumbnail_use_checklists_400.jpgNetwork security entails a ton of different procedures, and it can be easy to lose track of what you’ve already implemented, and what still needs to be done. Instead of worrying about keeping your business’s confidential data safe, know with certainty that it’s as secure as possible by following our security checklist.

Continue reading

Is Online Pornography a Problem for Your Business?

b2ap3_thumbnail_content_filtering_400.jpgThe topic of online pornography can be rather uncomfortable to discuss, but it’s an issue that business owners need to be aware of; especially considering that 70 percent of all online porn access happens during business hours! Whoa. This statistic has some naughty implications for what your employees may be doing on company time.

Continue reading

“Zero Trust” Network Security: Only Trust Data as Far as You Can Throw It!

b2ap3_thumbnail_zero_trust_400.jpgWhen it feels like everybody is out to get you, there's only one way to survive: Trust nobody. You may not have too many physical enemies ready to jump you, but there's an army of hackers wanting to breach your company's database. One of the securest ways to keep your company's information safe is to implement a "zero trust" network security model.

Continue reading

Unified Threat Management: Ultimate Protection for a New Era

b2ap3_thumbnail_data_and_network_security_400.jpgEverything changes in due time. Computers grow less secure, malware grows more sophisticated, and hackers' methods change. According to Processor magazine, 80 to 90 percent of attacks are targeted at devices rather than networks and servers. Just like the weakest link in a fence, all it takes is one weak point for a hacker to take down your entire network.

Continue reading

Sign Up for Our Newsletter

Powered by ChronoForms -

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Microsoft Productivity Hackers Malware Software Business Business Computing Google Windows 10 Miscellaneous Workplace Tips Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware Mobile Devices Mobile Computing IT Services Health Communication User Tips IT Support VoIP Business Management Network Email Holiday Data Quick Tips Virtualization Smartphone Server Business Continuity Office Mobile Device Management Saving Money Apps Disaster Recovery Alert Save Money Remote Computing Operating System Social Media Upgrade Going Green Small Business Android Chrome Microsoft Office Ransomware Social Facebook Mobility Application WiFi Identity Theft The Internet of Things Best Practice Big Data Antivirus Employer-Employee Relationship Managed Service Provider BYOD Analytics History Search Gmail Browser Current Events Government Law Enforcement Office Tips Information Technology Spam Password Saving Time Bandwidth Unified Threat Management Lithium-ion battery Hacking Printer Tablet Passwords Smartphones Humor Users USB Recovery Encryption Network Security Automation Remote Monitoring Streaming Media Tech Support Education intranet User Error Net Neutrality Firewall iPhone Computers Disaster Collaboration Laptop Wireless Money Data Management Avoiding Downtime Phone System Router Hard Drives Maintenance Apple Work/Life Balance communications Fraud Telephone Systems Gadgets Google Drive DDoS Benefits Outlook Printer Server VPN Marketing Cybercrime Office 365 App Administration Risk Management Private Cloud Content Filtering Managing Stress Wireless Technology Fax Server Point of Sale IT Consultant PowerPoint Personal Information Cost Management Update Data Loss Retail BDR Wearable Technology Entertainment Budget Proactive IT Managed IT Services Transportation Shortcut Mobile Office Business Intelligence Online Currency Internet Exlporer Biometrics Social Engineering Telephony Customer Service Wi-Fi IT Solutions Virtual Reality Flexibility Ebay Politics Computer Accessories Text Messaging Hiring/Firing Internet of Things CPU Bloatware Scalability Amazon Blogging Cameras Applications Experience IT consulting Mouse Artificial Intelligence Data Theft Distributed Denial of Service Sports Slow How To Smart Phones Touchpad Branding Music Network Congestion CloudSync eWaste Windows 8 Operating Sysytem Books WIndows 7 Programming Storage Compliance Television Files Two-factor Authentication Black Market Vendor Management Bluetooth Electronic Medical Records HaaS Inbound Marketing Trending Emails Chromecast Audit Customer Relationship Management Instant Messaging Computing SharePoint Safety User OneNote Excel Twitter Administrator Battery Prodcuctivity Reputation Teamwork Emergency Best Available Online Backup OneDrive Access Bring Your Own Device Automobile Presentation Paperless Office Meetings Cleaning Workplace Science Hosted Solution Display Worker Commute End of Support Miscelllaneous Running Cable Save Time Phishing Video Games Robot Networking Advertising HIPAA Hacker Legal Travel Regulations Data storage Human Resources Near Field Communication PDF Keyboard ISP Uninterrupted Power Supply RAM 3D Printing Website

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...