Contact us today!
(469) 567-0181
(903) 458-9400
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Follow this Security Checklist to Prevent a Hack Attack

b2ap3_thumbnail_use_checklists_400.jpgNetwork security entails a ton of different procedures, and it can be easy to lose track of what you’ve already implemented, and what still needs to be done. Instead of worrying about keeping your business’s confidential data safe, know with certainty that it’s as secure as possible by following our security checklist.

Continue reading

Is Online Pornography a Problem for Your Business?

b2ap3_thumbnail_content_filtering_400.jpgThe topic of online pornography can be rather uncomfortable to discuss, but it’s an issue that business owners need to be aware of; especially considering that 70 percent of all online porn access happens during business hours! Whoa. This statistic has some naughty implications for what your employees may be doing on company time.

Continue reading

“Zero Trust” Network Security: Only Trust Data as Far as You Can Throw It!

b2ap3_thumbnail_zero_trust_400.jpgWhen it feels like everybody is out to get you, there's only one way to survive: Trust nobody. You may not have too many physical enemies ready to jump you, but there's an army of hackers wanting to breach your company's database. One of the securest ways to keep your company's information safe is to implement a "zero trust" network security model.

Continue reading

Unified Threat Management: Ultimate Protection for a New Era

b2ap3_thumbnail_data_and_network_security_400.jpgEverything changes in due time. Computers grow less secure, malware grows more sophisticated, and hackers' methods change. According to Processor magazine, 80 to 90 percent of attacks are targeted at devices rather than networks and servers. Just like the weakest link in a fence, all it takes is one weak point for a hacker to take down your entire network.

Continue reading

Sign Up for Our Newsletter


Powered by ChronoForms -

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Business Software Business Computing Google Miscellaneous Workplace Tips Windows 10 Backup Efficiency Innovation Computer Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing Communication User Tips IT Support Business Management VoIP Email Server Holiday Network Data Quick Tips Virtualization Smartphone Office Going Green Business Continuity Mobile Device Management Saving Money Save Money Disaster Recovery Apps Alert Remote Computing Operating System Social Media Upgrade Small Business Android Chrome Managed Service Provider Antivirus Mobility Microsoft Office Social Application Facebook Best Practice Employer-Employee Relationship Ransomware WiFi The Internet of Things Identity Theft Big Data Printer Passwords Law Enforcement History Office Tips Analytics BYOD Search Gmail Password Browser Current Events Government Information Technology Spam Bandwidth Unified Threat Management Saving Time Hacking Tablet Lithium-ion battery Maintenance Hard Drives Gadgets Fraud Smartphones Users USB Data Management Money Wireless Encryption Streaming Media Education Remote Monitoring Tech Support User Error communications Work/Life Balance Computers Disaster Telephone Systems intranet Firewall Net Neutrality Humor iPhone Collaboration Laptop Avoiding Downtime Phone System Router Recovery Apple Network Security Automation IT Solutions Risk Management Office 365 Private Cloud Managing Stress Wireless Technology Outlook Update Printer Server Personal Information Marketing Budget VPN Administration Transportation Shortcut Business Intelligence Content Filtering Managed IT Services Internet Exlporer App Point of Sale Biometrics PowerPoint Social Engineering Telephony Customer Service Cost Management Retail IT Consultant Fax Server Wi-Fi Virtual Reality BDR Data Loss Google Drive Entertainment DDoS Flexibility Mobile Office Benefits Wearable Technology Proactive IT Cybercrime Online Currency Operating Sysytem Regulations WIndows 7 Storage ISP Television Files Books Two-factor Authentication 3D Printing Bluetooth Trending Black Market Chromecast Electronic Medical Records Customer Relationship Management User Website RAM Cameras SharePoint HaaS Instant Messaging Data Theft Excel Ebay Administrator Safety Best Available Blogging CPU Reputation Teamwork Amazon Battery CloudSync Access Emergency Presentation Slow Meetings Smart Phones Hosted Solution Automobile Compliance Science Programming Cleaning Phishing Windows 8 End of Support Running Cable Worker Commute Inbound Marketing Robot Save Time Emails Networking Audit Vendor Management Advertising Video Games Twitter OneNote Data storage Hacker Human Resources Near Field Communication Computing PDF Legal Uninterrupted Power Supply OneDrive Keyboard Bring Your Own Device Prodcuctivity Paperless Office Computer Accessories Text Messaging Internet of Things Politics Bloatware Workplace Online Backup Applications Hiring/Firing IT consulting Miscelllaneous Mouse Artificial Intelligence Distributed Denial of Service Scalability Sports Experience Touchpad Branding HIPAA Network Congestion Display eWaste How To Music Travel

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...