Contact us today!
(469) 567-0181
(903) 458-9400
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why Heart Attack Victims Should Be Wary of Hacking Attacks

Why Heart Attack Victims Should Be Wary of Hacking Attacks

It goes without saying that having to rely on a pacemaker isn’t an ideal circumstance for anyone, even considering that the device allows the patient to continue living a fulfilling life. This is why a particular discovery of a European-based research team becomes a shade or two darker: the team has concluded that it’s possible for a novice to send life-threatening signals to the device.

Recent comment in this post
Ashton Brewer
Victims of the heart attack are found here or the comfort use of the offs for people. It is sorted for the movement of the https:/... Read More
Friday, 09 August 2019 00:12
Continue reading
1 Comment

Passwords Are on the Way Out. What’s Next?

Passwords Are on the Way Out. What’s Next?

Passwords are a critical security component of any online account. In many cases, they’re the fine line of defense against the horde of threats that exist on the Internet. The problem that many users have with passwords, however, is that good passwords are difficult to remember, and on their own, aren’t necessarily the most secure option. So, how can you make passwords both easier to use and more secure?

Continue reading

New Study Shows Passwords Can, In Fact, be Remembered

b2ap3_thumbnail_people_remember_passwords_400.jpgWe see a lot of password-bashing these days, and some people have lost faith in them as a security measure. But, unfortunately, a lot of the blame for this lies in human memory. We just don’t pick passwords that are strong enough. In fact, a mind-numbing one in 20 people still use “password” to keep their information safe.

Continue reading

Sign Up for Our Newsletter


Powered by ChronoForms -

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Security Tip of the Week Technology Privacy Best Practices Cloud Internet Microsoft Productivity Hackers Malware Business Computing Google Business Software Windows 10 Miscellaneous Workplace Tips Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware Mobile Computing IT Services Health Mobile Devices User Tips Communication IT Support VoIP Business Management Smartphone Virtualization Email Holiday Server Network Data Quick Tips Operating System Social Media Upgrade Disaster Recovery Apps Alert Office Going Green Save Money Business Continuity Mobile Device Management Remote Computing Saving Money Android Small Business Chrome Best Practice The Internet of Things Big Data Employer-Employee Relationship Managed Service Provider Microsoft Office Ransomware WiFi Social Identity Theft Mobility Facebook Antivirus Application Hacking Tablet Passwords Saving Time History Analytics Search Gmail Lithium-ion battery Browser Printer Current Events Government Law Enforcement Office Tips BYOD Information Technology Password Spam Bandwidth Unified Threat Management Remote Monitoring Apple Tech Support communications Telephone Systems intranet Gadgets Firewall Net Neutrality Smartphones Humor iPhone Collaboration Users Laptop USB Recovery Network Security Automation Maintenance Hard Drives Streaming Media Fraud Education User Error Wireless Disaster Computers Data Management Money Avoiding Downtime Encryption Work/Life Balance Phone System Router Internet Exlporer App Wi-Fi Biometrics Social Engineering Flexibility Telephony Customer Service IT Solutions IT Consultant Fax Server Virtual Reality Data Loss Google Drive DDoS Outlook Benefits Wearable Technology Printer Server Office 365 Proactive IT Cybercrime Online Currency Marketing Administration Risk Management Managing Stress Content Filtering Private Cloud Personal Information Wireless Technology Point of Sale PowerPoint Cost Management Update Retail Managed IT Services BDR Budget VPN Entertainment Mobile Office Transportation Shortcut Business Intelligence Keyboard Robot Networking Vendor Management HIPAA Advertising Politics Travel Hiring/Firing Data storage Human Resources Regulations Near Field Communication Computing ISP PDF Scalability Experience 3D Printing Uninterrupted Power Supply Prodcuctivity Computer Accessories Text Messaging How To Music Internet of Things Bloatware Online Backup Applications Cameras IT consulting Distributed Denial of Service Mouse Data Theft Artificial Intelligence Books Sports Touchpad Branding eWaste Network Congestion Display CloudSync Black Market Electronic Medical Records WIndows 7 Operating Sysytem HaaS Television Storage Compliance Programming Instant Messaging Safety Files Two-factor Authentication Bluetooth Trending Inbound Marketing Battery Audit Emergency Chromecast Customer Relationship Management Emails User Website RAM SharePoint Excel Ebay Twitter OneNote Automobile Cleaning Administrator Amazon Best Available Blogging CPU Reputation Teamwork OneDrive Worker Commute Bring Your Own Device Save Time Access Presentation Smart Phones Paperless Office Slow Video Games Meetings Hosted Solution Science Workplace Hacker Phishing Windows 8 Miscelllaneous End of Support Legal Running Cable

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...