The Thurston, Pierce, Lewis, and Mason Counties IT Experts

We work hard behind the scenes so annoying technology issues don't slow your business down.

Our mission is to help businesses like yours increase productivity and get more out of the technology you invest in.
We specialize in solutions that safeguard and protect your data and keep operations running smoothly.

Managed IT Services

Intelligent remote monitoring, proactive maintenance, and behind-the-scenes remote support.

read more


Network Security

Protect your business from threats like malware, viruses, phishing attacks, hackers and other threads.

read more

Backup & Disaster Recovery

Ensure peace-of-mind in any situation with the most complete data backup solution available.

read more

Cloud Hosting Solutions

Reduce infrastructure costs, collaborate, and get more done with our unique cloud solutions.

read more

When you just want IT to work!

There are a lot of computer shops out there that you can call up to fix an issue or install a piece of equipment. They might be able to get you out of crisis mode, but they aren’t looking at the full picture.

At PC Technologies, we understand business. We consult. We provide solutions to solve everyday challenges. We just happen to fix computers as well.

We believe (and have proven) that if you proactively manage technology, run maintenance religiously, and monitor a business network, everyday issues and downtime will be greatly reduced.

This is what makes us different than your typical tech support company. Sure, we can fix computer issues when you have them, but our specialty is preventing them in the first place.

Are you looking for a partner you can trust your IT with? Sign up for a FREE IT Assessment to get started today.

  • First Name *
  • Last Name *
  • Company name
  • Phone *

      Who Are We?

      It's Nice To Know Who You're Working With, We Get That

      PC Technologies understands that making a decision means putting your trust in us. We encourage you to find out more about our company and read testimonials from our many satisfied customers!

      About PC Technologies

      We are not your typical business, We are your business partners

      We live by the idea that your business needs come first, so much so that our CEO W. Jeff Seeman has written a letter for you to read showing just how dedicated our team is to not only solving problems but your success!

      Read More
      Our Difference
      It's a Secret

      Shhh, don't tell anyone we told you!

      WARNING: We are about to let you in on a secret about how most computer companies really make their money! We will cover the three main types of IT companies and what you can expect out of them.

      Discover What It Is!

      Refer A Friend To PC Technologies!

      Do you know someone who you think my benefit from our services? Let us know and we will get in touch with them!

      Read More
      Refer a Friend

      What Our Clients Say

      • I highly recommend PC Technologies for any of your IT and/or computer needs
        Practice Manager at Robert GR Lang, MD Inc

        Jeff has provided computer components and IT services to our medical practice since 2007. He has seen us through a system conversion, office move, and EMR implementation, providing the peripherals and support needed to make a smooth transition each time. He and his staff are prompt, professional, and price conscious. I highly recommend PC Technologies for any of your IT and/or computer needs

      • Gets it fixed fast

        Jeff and his staff installed a major computer upgrade for my office. There was no down time for my staff, the system works great and whenever there's glitch, Jeff, or one of his staff, gets it fixed fast.

      • No more having to take the computer into the store
        Director at Washington Gemological Laboratory

        I have relied on Jeff and his crew for not only minor 'bugs' that occur but also for swapping out the entire data from an older laptop into the one I currently use. They have always been able to do the job and quickly. Most of the time they are able to resolve the issue over the phone, while controlling my computer from their office. Love it!! Makes my life so much easier. No more having to take the computer into the store.

      • Jeff is the IT consultant for our company.
        Citizen Action Network at Freedom Foundation

        He goes the extra mile to ensure that all of our computer infrastructure is running smoothly. When we do encounter problems Jeff is quick to respond. He has become integral to our team--so much so, we should call him a staff member rather than a consultant.

      • PC Tech is a great place to get all of your IT needs.
        Branch Manager / Loan Officer at Weststar Pacific Mortgage

        Jeff is always available and works with you on the best possible solutions to ones needs. I would recommend PC Tech to anyone that is running a business and does not want to deal with IT.

      • Jeff is able to bridge the gap between IT professional and customer relationships very well.
        Board Member at Seattle Search Network

        I've recommended him to clients that are in need of IT services many times. Jeff is highly skilled in IT and understands the changing trends and its impact to the small business owner. I'd highly recommend Jeff to others seeking for an IT professional.

      Latest Blogs

      3 Common Threats You Need to Know About: Malware, Rootkits, and Trojans

      Defining Malware
      Malware, or “malicious software,” is a blanket term for malicious code that’s designed to cause trouble for the machine that it infects. Malware can inject code into applications or execute viruses and trojans. One of the most common types of malware is called ransomware (perhaps you’ve heard of it), in which the files on a system are encrypted until a ransom is paid to the developer. Malware can have far-reaching and varied effects, so it’s best to keep such unpredictable threats off of your network in the first place.

      Defining Rootkits
      Just like malware, a rootkit is designed to install on a system. Unlike some types of malware, however, rootkits are designed to allow a hacker to gain control of the system while remaining undetected themselves. In particular, rootkits are dangerous due to their ability to subvert the software that’s supposed to find them, making it optimal to prevent rootkits from accessing your system in the first place.

      Defining Trojans
      In computing, a trojan is a malicious entity that allows a hacker access to a system through misleading the user. While the purpose can vary from data destruction to theft, trojans are often used to install backdoors and allow access to a system at a later date for the purpose of surveillance or espionage.

      Preventative Security Measures
      Just like how there are various types of threats, there are plenty of ways to keep your organization’s network safe from them. Here are just a few.

      • Firewall: Firewalls act as a bouncer for your network, keeping threats from entering or leaving your infrastructure. They work best when combined with other preventative measures, like antivirus, content filters, and spam blockers.
      • Antivirus: Antivirus solutions detect and eliminate threats that have made it past your firewall solution. Prompt detection is important, as viruses or malware that are left unchecked could cause untold troubles for your infrastructure.
      • Spam blocker: Threats often arrive in your email inbox as spam, and the unknowing employee could accidentally click a malicious link or reveal important credentials. A spam blocker eliminates the majority of spam so that it never even hits your inbox.
      • Content filter: A content filter is helpful for keeping your employees from accessing sites known to host malware, as well as inappropriate or time-wasting sites, like social media.

      All of the above solutions can be found in what’s called a Unified Threat Management (UTM) solution, which is widely considered to be one of the most comprehensive and useful preventative measures to improve network security. To learn more about UTMs and other topics concerning network security, reach out to us at 360-491-2227.

      Learn More

      Tip of the Week: 3 Exercises to Offset the Pain of Working From a Desk

      This standing/anti-aging study was published in the British Journal of Sports Medicine. It links aging with the chromosome “telomeres” that protects one’s genetic code. This chromosome shortens when a person sits, and lengthens when a person stands. Longer telomeres are better at protecting genetic code by keeping it from wearing and tearing, whereas shorter telomere have been linked to premature aging.

      The study even makes the claim that standing is better than exercise, seeing that exercise doesn’t have any impact on telomere length. In fact, a top medic from the study claims that, “Standing up for three hours a day is the same as ten marathons.” Scientific research like this is groundbreaking for anybody trying to live longer by dieting and exercising.

      To further make our case against sitting at a desk all day, consider these statistics from the Harvard Business Review:

      • As we work, we sit more than we do anything else. The average person sits for 9.3 hours a day, compared to 7.7 hours of sleeping.
      • After one hour of sitting, the production of enzymes that burn fat declines by as much as 90 percent. Extended sitting slows the body’s metabolism affecting things like HDL levels in our bodies (good cholesterol).
      • Research shows that this lack of physical activity is directly tied to 6 percent of the impact for heart diseases, 7 percent for type 2 diabetes, and 10 percent for breast cancer or colon cancer.

      In the biggest blow to the practice of sitting at a desk, further research shows that if you sit for more than 23 hours a week, you are 64 percent more likely to die from a heart attack.

      What’s a health-conscious office worker to do? If you’re able to switch to a standing desk, then this simple move may literally add years to your life. Another helpful activity you can do to somewhat offset the negative health effects of sitting is to incorporate regular stretching exercises into your daily routine. To help you out, here are three easy exercises that virtually anybody can do.

      Get Down and Stretch
      Get down on all fours and slowly rock back and forth. When rocking back, your hips should move down towards your feet, and make sure to extend your back across the lower portion of your spine. Also, make sure to relax the stretch when returning to the forward position. If you’d like to make the stretch more impactful, nod your head as you rock, bringing your chin to and from your chest.

      Roll Around on the Ground
      Start by lying on your stomach and then lift your arms above your head. Next, lift your arms and use their weight to roll over a few times on each side. Make sure you’re using the weight of your arm to roll, instead of using the ground to push yourself over.

      The Benefits of Crawling
      It’s surprising that something so basic as crawling can double as such a good exercise. When crawling on all fours for exercise purposes, be sure to move your hips as much as possible. At the same time, stretch your neck by turning your head from side to side while moving backward.

      Between standing and stretching, you may be able to offset the damage done from years of sitting. What about you? Would you identify as someone who spends way too many hours sitting on your keister? Have we convinced you to sit less and stand more? Share your thoughts with us in the comments.

      Learn More

      3 Instant Benefits You’ll Experience When Moving to the Cloud

      Here are three ways that the cloud can help your business.

      Anywhere Access to Applications and Data
      If your organization is new to cloud computing, one of the better ways you can capitalize on its value is by using virtual applications that are hosted on and provided by an online environment. In fact, your business might already be using cloud-based applications, like Microsoft Office 365 or the newly-renamed Google Apps, the “G Suite.” These solutions offer data storage and cloud solutions that can help your employees work effectively from anywhere with an Internet connection. This helps them get more work done, and in turn, helps your business improve efficiency.

      Additionally, it can be beneficial to host other applications and services in the cloud. For example, a cloud-based VoIP solution gives your team access to an online phone system that can be accessed via a desktop or mobile app, providing greater communication to your employees.

      Improved Budget
      Since the cloud uses virtualized machines to distribute your data, like servers and your desktop infrastructure, you can significantly cut costs by reducing the amount of hardware that you host on-site. You can manage workloads and operations all through the cloud, which helps you to optimize network operations and reduce inefficiencies. Plus, since you’re using minimal actual hardware, you save on utility bills like electricity and air conditioning, and you don’t have to maintain multiple hardware systems like you would with a whole room filled with servers.

      Simplified Network with Room for Flexibility
      When your network is simple, it means that you’re hosting it on the minimum amount of hardware possible. Calling it “simple” may not be the best way to describe it; rather, it’s using only the required hardware on-site, with the rest of it being hosted in the cloud. All of your organization’s critical solutions can be accessed and called upon from the cloud. For example, a desktop infrastructure hosted in the cloud allows you to take advantage of thin clients, which are essentially less resource-intensive workstations that call applications and desktop functionality from a centralized server. When implemented properly, thin clients can effectively reduce costs and improve efficiency. Plus, cloud-hosting allows you the flexibility to adapt resources adequately as your business grows.

      To learn more about the cloud or to ask about what the cloud can do for your business, reach out to us at 360-491-2227.

      Learn More

      Know someone who would benefit from PC Technologies? Let us know!

      Latest Blog Entry

      Security is one of the most important parts of running a business, especially today when organizations rely so heavily on their technology solutions. Some of the most dangerous threats lurk on a business’s network, watching and waiting for an opportunity to do some real dama...

      Latest News

      PC Technologies launches new website!

      PC Technologies is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account Login

      Remember me