Contact us today!
(469) 567-0181
(903) 458-9400
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why Heart Attack Victims Should Be Wary of Hacking Attacks

Why Heart Attack Victims Should Be Wary of Hacking Attacks

It goes without saying that having to rely on a pacemaker isn’t an ideal circumstance for anyone, even considering that the device allows the patient to continue living a fulfilling life. This is why a particular discovery of a European-based research team becomes a shade or two darker: the team has concluded that it’s possible for a novice to send life-threatening signals to the device.

Recent comment in this post
Ashton Brewer
Victims of the heart attack are found here or the comfort use of the offs for people. It is sorted for the movement of the https:/... Read More
Friday, 09 August 2019 00:12
Continue reading
1 Comment

Passwords Are on the Way Out. What’s Next?

Passwords Are on the Way Out. What’s Next?

Passwords are a critical security component of any online account. In many cases, they’re the fine line of defense against the horde of threats that exist on the Internet. The problem that many users have with passwords, however, is that good passwords are difficult to remember, and on their own, aren’t necessarily the most secure option. So, how can you make passwords both easier to use and more secure?

Continue reading

New Study Shows Passwords Can, In Fact, be Remembered

b2ap3_thumbnail_people_remember_passwords_400.jpgWe see a lot of password-bashing these days, and some people have lost faith in them as a security measure. But, unfortunately, a lot of the blame for this lies in human memory. We just don’t pick passwords that are strong enough. In fact, a mind-numbing one in 20 people still use “password” to keep their information safe.

Continue reading

Sign Up for Our Newsletter

Powered by ChronoForms -

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Microsoft Productivity Hackers Malware Software Business Computing Google Business Windows 10 Miscellaneous Workplace Tips Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware Mobile Devices Mobile Computing IT Services Health User Tips Communication IT Support VoIP Business Management Network Data Quick Tips Smartphone Virtualization Email Holiday Server Business Continuity Save Money Mobile Device Management Remote Computing Saving Money Operating System Social Media Upgrade Apps Disaster Recovery Alert Office Going Green Small Business Chrome Android Best Practice Employer-Employee Relationship Ransomware The Internet of Things Big Data Mobility Managed Service Provider Microsoft Office WiFi Social Identity Theft Facebook Application Antivirus BYOD Information Technology Spam Bandwidth Unified Threat Management Hacking Tablet Passwords Saving Time Analytics History Search Gmail Law Enforcement Lithium-ion battery Office Tips Browser Printer Password Current Events Government Computers Disaster communications Telephone Systems Encryption Avoiding Downtime Phone System Humor Router Apple Remote Monitoring Tech Support Recovery Gadgets intranet Network Security Smartphones Net Neutrality Automation Firewall iPhone USB Collaboration Laptop Users Wireless Hard Drives Maintenance Streaming Media Fraud Work/Life Balance Data Management Money Education User Error Cost Management Flexibility Internet Exlporer Retail Biometrics Social Engineering BDR Entertainment Telephony VPN Customer Service Virtual Reality Mobile Office Google Drive DDoS App Office 365 Benefits IT Solutions Fax Server IT Consultant Cybercrime Data Loss Risk Management Personal Information Wearable Technology Outlook Managing Stress Private Cloud Printer Server Proactive IT Wireless Technology Managed IT Services Update Online Currency Marketing Administration Content Filtering Budget Point of Sale Wi-Fi Transportation PowerPoint Shortcut Business Intelligence Ebay Phishing Keyboard End of Support Twitter Running Cable OneNote CPU Politics Robot Amazon Networking Blogging OneDrive Hiring/Firing Advertising Scalability Bring Your Own Device Slow Experience Data storage Paperless Office Smart Phones Human Resources Near Field Communication Workplace PDF How To Uninterrupted Power Supply Music Miscelllaneous Windows 8 Computer Accessories Text Messaging Internet of Things Bloatware IT consulting Books Applications HIPAA Vendor Management Distributed Denial of Service Mouse Artificial Intelligence Travel Regulations Black Market Sports Electronic Medical Records Touchpad Computing Branding ISP eWaste Network Congestion 3D Printing HaaS Instant Messaging WIndows 7 Safety Operating Sysytem Prodcuctivity Television Storage Cameras Battery Files Two-factor Authentication Online Backup Emergency Data Theft Bluetooth Trending Automobile Chromecast Customer Relationship Management Display User Cleaning CloudSync SharePoint Excel Worker Commute Administrator Best Available Save Time Reputation Compliance Teamwork Programming Video Games Access Presentation Hacker Inbound Marketing Meetings Legal Hosted Solution Audit Science Emails RAM Website

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...