Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Follow this Security Checklist to Prevent a Hack Attack

b2ap3_thumbnail_use_checklists_400.jpgNetwork security entails a ton of different procedures, and it can be easy to lose track of what you’ve already implemented, and what still needs to be done. Instead of worrying about keeping your business’s confidential data safe, know with certainty that it’s as secure as possible by following our security checklist.

Continue reading
0 Comments

Is Online Pornography a Problem for Your Business?

b2ap3_thumbnail_content_filtering_400.jpgThe topic of online pornography can be rather uncomfortable to discuss, but it’s an issue that business owners need to be aware of; especially considering that 70 percent of all online porn access happens during business hours! Whoa. This statistic has some naughty implications for what your employees may be doing on company time.

Continue reading
0 Comments

“Zero Trust” Network Security: Only Trust Data as Far as You Can Throw It!

b2ap3_thumbnail_zero_trust_400.jpgWhen it feels like everybody is out to get you, there's only one way to survive: Trust nobody. You may not have too many physical enemies ready to jump you, but there's an army of hackers wanting to breach your company's database. One of the securest ways to keep your company's information safe is to implement a "zero trust" network security model.

Continue reading
0 Comments

Unified Threat Management: Ultimate Protection for a New Era

b2ap3_thumbnail_data_and_network_security_400.jpgEverything changes in due time. Computers grow less secure, malware grows more sophisticated, and hackers' methods change. According to Processor magazine, 80 to 90 percent of attacks are targeted at devices rather than networks and servers. Just like the weakest link in a fence, all it takes is one weak point for a hacker to take down your entire network.

Continue reading
0 Comments

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Software Business Business Computing Google Miscellaneous Workplace Tips Windows 10 Innovation Computer Backup Efficiency Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing IT Support Communication User Tips Business Management VoIP Smartphone Server Network Email Data Holiday Quick Tips Virtualization Remote Computing Operating System Going Green Social Media Upgrade Business Continuity Mobile Device Management Office Saving Money Apps Disaster Recovery Alert Save Money Chrome Small Business Android WiFi Application Identity Theft The Internet of Things Best Practice Antivirus Big Data Employer-Employee Relationship Managed Service Provider Microsoft Office Ransomware Social Facebook Mobility Information Technology Saving Time Password Spam Bandwidth Lithium-ion battery Unified Threat Management Printer Hacking Tablet BYOD Passwords Analytics History Search Gmail Browser Current Events Government Law Enforcement Office Tips Wireless Data Management Money Avoiding Downtime Phone System Hard Drives Maintenance Router Apple Fraud communications Work/Life Balance Telephone Systems Gadgets Smartphones Humor USB Users Encryption Recovery Network Security Remote Monitoring Automation Tech Support Streaming Media intranet Education Net Neutrality Firewall iPhone User Error Laptop Collaboration Computers Disaster Personal Information Retail BDR Proactive IT Entertainment Budget Online Currency Business Intelligence Mobile Office Transportation Shortcut Managed IT Services Internet Exlporer Biometrics Social Engineering Telephony Customer Service IT Solutions Wi-Fi Virtual Reality Google Drive DDoS Flexibility VPN Outlook Benefits Printer Server App Cybercrime Marketing Administration Risk Management Office 365 Managing Stress Content Filtering IT Consultant Private Cloud Fax Server Wireless Technology Point of Sale Data Loss PowerPoint Cost Management Update Wearable Technology Teamwork Best Available Reputation OneDrive Battery Presentation Bring Your Own Device Access Emergency Meetings Paperless Office Display Workplace Hosted Solution Automobile Science Cleaning Running Cable Phishing Miscelllaneous End of Support Worker Commute Robot Save Time Networking Video Games HIPAA Advertising Travel Regulations Near Field Communication Website Data storage Hacker RAM Human Resources Legal Ebay ISP PDF 3D Printing Uninterrupted Power Supply Amazon Blogging Keyboard CPU Computer Accessories Text Messaging Internet of Things Politics Bloatware Cameras IT consulting Smart Phones Applications Hiring/Firing Slow Distributed Denial of Service Scalability Mouse Data Theft Artificial Intelligence Sports Experience Windows 8 Touchpad Branding eWaste How To Network Congestion CloudSync Music WIndows 7 Vendor Management Operating Sysytem Television Storage Compliance Programming Files Books Two-factor Authentication Bluetooth Computing Trending Black Market Inbound Marketing Audit Chromecast Electronic Medical Records Customer Relationship Management Emails SharePoint HaaS User Prodcuctivity Instant Messaging Excel Twitter OneNote Administrator Safety Online Backup

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code