Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why Heart Attack Victims Should Be Wary of Hacking Attacks

Why Heart Attack Victims Should Be Wary of Hacking Attacks

It goes without saying that having to rely on a pacemaker isn’t an ideal circumstance for anyone, even considering that the device allows the patient to continue living a fulfilling life. This is why a particular discovery of a European-based research team becomes a shade or two darker: the team has concluded that it’s possible for a novice to send life-threatening signals to the device.

Continue reading

Passwords Are on the Way Out. What’s Next?

Passwords Are on the Way Out. What’s Next?

Passwords are a critical security component of any online account. In many cases, they’re the fine line of defense against the horde of threats that exist on the Internet. The problem that many users have with passwords, however, is that good passwords are difficult to remember, and on their own, aren’t necessarily the most secure option. So, how can you make passwords both easier to use and more secure?

Continue reading

New Study Shows Passwords Can, In Fact, be Remembered

b2ap3_thumbnail_people_remember_passwords_400.jpgWe see a lot of password-bashing these days, and some people have lost faith in them as a security measure. But, unfortunately, a lot of the blame for this lies in human memory. We just don’t pick passwords that are strong enough. In fact, a mind-numbing one in 20 people still use “password” to keep their information safe.

Continue reading

Sign Up for Our Newsletter

Powered by ChronoForms -

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Microsoft Productivity Hackers Malware Google Business Software Business Computing Miscellaneous Workplace Tips Windows 10 Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing IT Support User Tips Communication VoIP Business Management Holiday Virtualization Server Network Smartphone Data Quick Tips Email Disaster Recovery Apps Alert Save Money Going Green Remote Computing Business Continuity Mobile Device Management Operating System Social Media Upgrade Saving Money Office Android Chrome Small Business Social Application Facebook WiFi Identity Theft Best Practice Employer-Employee Relationship Antivirus Ransomware The Internet of Things Big Data Managed Service Provider Microsoft Office Mobility Law Enforcement History Office Tips Analytics Search Gmail Password Browser Saving Time Current Events Government Lithium-ion battery Printer Information Technology Spam Bandwidth BYOD Unified Threat Management Hacking Tablet Passwords Users USB intranet Net Neutrality Firewall iPhone Collaboration Laptop Data Management Money Wireless Streaming Media Education User Error Hard Drives communications Maintenance Work/Life Balance Computers Disaster Fraud Telephone Systems Humor Avoiding Downtime Phone System Router Recovery Apple Network Security Encryption Automation Gadgets Smartphones Remote Monitoring Tech Support Outlook Update IT Consultant Fax Server Printer Server Data Loss Personal Information Marketing Budget Administration Wearable Technology Transportation Proactive IT Shortcut Business Intelligence Content Filtering Managed IT Services Internet Exlporer Point of Sale Online Currency Biometrics PowerPoint Social Engineering Telephony Customer Service Cost Management Retail Wi-Fi Virtual Reality BDR Google Drive Entertainment Flexibility DDoS Mobile Office Benefits VPN Cybercrime IT Solutions Risk Management Office 365 App Managing Stress Private Cloud Wireless Technology Chromecast Electronic Medical Records Customer Relationship Management User Cameras SharePoint HaaS Instant Messaging Data Theft Excel Computing Administrator Safety Best Available Reputation Teamwork Battery CloudSync Prodcuctivity Access Emergency Presentation Online Backup Meetings Hosted Solution Automobile Compliance Science Programming Cleaning Phishing End of Support Running Cable Display Worker Commute Inbound Marketing Robot Save Time Emails Networking Audit Advertising Video Games Twitter OneNote Data storage Hacker Human Resources Near Field Communication PDF Legal Uninterrupted Power Supply OneDrive Keyboard Bring Your Own Device Website Paperless Office Computer Accessories RAM Text Messaging Internet of Things Ebay Politics Bloatware Workplace Applications Hiring/Firing IT consulting Distributed Denial of Service Blogging Scalability Miscelllaneous Mouse CPU Artificial Intelligence Amazon Sports Experience Touchpad Branding eWaste How To HIPAA Network Congestion Slow Smart Phones Music Travel WIndows 7 Operating Sysytem Regulations Television Windows 8 Storage ISP 3D Printing Files Books Two-factor Authentication Bluetooth Trending Vendor Management Black Market

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...