Contact us today!
(469) 567-0181
(903) 458-9400
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why Heart Attack Victims Should Be Wary of Hacking Attacks

Why Heart Attack Victims Should Be Wary of Hacking Attacks

It goes without saying that having to rely on a pacemaker isn’t an ideal circumstance for anyone, even considering that the device allows the patient to continue living a fulfilling life. This is why a particular discovery of a European-based research team becomes a shade or two darker: the team has concluded that it’s possible for a novice to send life-threatening signals to the device.

Recent comment in this post
Ashton Brewer
Victims of the heart attack are found here or the comfort use of the offs for people. It is sorted for the movement of the https:/... Read More
Friday, 09 August 2019 00:12
Continue reading
1 Comment

Passwords Are on the Way Out. What’s Next?

Passwords Are on the Way Out. What’s Next?

Passwords are a critical security component of any online account. In many cases, they’re the fine line of defense against the horde of threats that exist on the Internet. The problem that many users have with passwords, however, is that good passwords are difficult to remember, and on their own, aren’t necessarily the most secure option. So, how can you make passwords both easier to use and more secure?

Continue reading

New Study Shows Passwords Can, In Fact, be Remembered

b2ap3_thumbnail_people_remember_passwords_400.jpgWe see a lot of password-bashing these days, and some people have lost faith in them as a security measure. But, unfortunately, a lot of the blame for this lies in human memory. We just don’t pick passwords that are strong enough. In fact, a mind-numbing one in 20 people still use “password” to keep their information safe.

Continue reading

Sign Up for Our Newsletter

Powered by ChronoForms -

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Software Business Computing Google Business Miscellaneous Workplace Tips Windows 10 Innovation Computer Backup Efficiency Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing IT Support User Tips Communication Business Management VoIP Server Network Smartphone Data Quick Tips Email Holiday Virtualization Save Money Going Green Remote Computing Business Continuity Operating System Mobile Device Management Social Media Upgrade Saving Money Office Disaster Recovery Apps Alert Chrome Small Business Android Identity Theft Best Practice Antivirus Employer-Employee Relationship Ransomware The Internet of Things Mobility Big Data Managed Service Provider Microsoft Office Social Facebook WiFi Application Government Lithium-ion battery Printer Information Technology Spam Bandwidth Unified Threat Management BYOD Hacking Tablet Passwords Analytics History Search Gmail Law Enforcement Office Tips Browser Saving Time Current Events Password Education Money Data Management Hard Drives User Error Maintenance Computers Disaster Fraud communications Avoiding Downtime Telephone Systems Phone System Humor Router Apple Encryption Recovery Gadgets Network Security Smartphones Remote Monitoring Automation Tech Support USB Users Wireless intranet Net Neutrality Firewall iPhone Collaboration Laptop Work/Life Balance Streaming Media Budget Content Filtering Wi-Fi Online Currency Point of Sale Shortcut Business Intelligence PowerPoint Transportation Flexibility Cost Management Internet Exlporer Biometrics Retail BDR Social Engineering Entertainment Telephony Customer Service Mobile Office Virtual Reality Google Drive Office 365 DDoS VPN Benefits IT Solutions App Cybercrime Personal Information Risk Management Outlook IT Consultant Fax Server Managing Stress Printer Server Private Cloud Wireless Technology Data Loss Managed IT Services Update Marketing Administration Wearable Technology Proactive IT Presentation Access Legal Display Meetings Inbound Marketing Emails Audit Keyboard Hosted Solution Science OneNote End of Support Politics Running Cable Phishing Twitter Hiring/Firing Networking Robot Scalability OneDrive Advertising Experience Bring Your Own Device Human Resources RAM Near Field Communication Paperless Office Data storage How To Website Workplace PDF Music Ebay Uninterrupted Power Supply CPU Miscelllaneous Amazon Blogging Text Messaging Books Computer Accessories Internet of Things Bloatware Slow IT consulting HIPAA Smart Phones Applications Black Market Artificial Intelligence Electronic Medical Records Distributed Denial of Service Mouse Travel Regulations Sports HaaS Instant Messaging Windows 8 Branding ISP Touchpad Safety 3D Printing eWaste Network Congestion Battery Vendor Management WIndows 7 Operating Sysytem Emergency Television Storage Cameras Files Two-factor Authentication Automobile Bluetooth Data Theft Computing Cleaning Trending Chromecast Customer Relationship Management Worker Commute SharePoint User CloudSync Prodcuctivity Save Time Excel Online Backup Administrator Video Games Reputation Teamwork Best Available Compliance Programming Hacker

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...