Get Started Today!  360-491-2227

The Thurston, Pierce, Lewis, and Mason Counties IT Experts

We work hard behind the scenes so annoying technology issues don't slow your business down.

Our mission is to help businesses like yours increase productivity and get more out of the technology you invest in.
We specialize in solutions that safeguard and protect your data and keep operations running smoothly.

Managed IT Services

Intelligent remote monitoring, proactive maintenance, and behind-the-scenes remote support.

read more


Network Security

Protect your business from threats like malware, viruses, phishing attacks, hackers and other threats.

read more

Backup & Disaster Recovery

Ensure peace-of-mind in any situation with the most complete data backup solution available.

read more

Cloud Hosting Solutions

Reduce infrastructure costs, collaborate, and get more done with our unique cloud solutions.

read more

When you just want IT to work!

There are a lot of computer shops out there that you can call up to fix an issue or install a piece of equipment. They might be able to get you out of crisis mode, but they aren’t looking at the full picture.

At PC Technologies, we understand business. We consult. We provide solutions to solve everyday challenges. We just happen to fix computers as well.

We believe (and have proven) that if you proactively manage technology, run maintenance religiously, and monitor a business network, everyday issues and downtime will be greatly reduced.

This is what makes us different than your typical tech support company. Sure, we can fix computer issues when you have them, but our specialty is preventing them in the first place.

Are you looking for a partner you can trust your IT with? Sign up for a FREE IT Assessment to get started today.

  • First Name *
  • Last Name *
  • Company name
  • Phone *

      Who Are We?

      It's Nice To Know Who You're Working With, We Get That

      PC Technologies understands that making a decision means putting your trust in us. We encourage you to find out more about our company and read testimonials from our many satisfied customers!

      About PC Technologies

      We are not your typical business, We are your business partners

      We live by the idea that your business needs come first, so much so that our CEO W. Jeff Seeman has written a letter for you to read showing just how dedicated our team is to not only solving problems but your success!

      Read More
      Our Difference
      It's a Secret

      Shhh, don't tell anyone we told you!

      WARNING: We are about to let you in on a secret about how most computer companies really make their money! We will cover the three main types of IT companies and what you can expect out of them.

      Discover What It Is!

      Refer A Friend To PC Technologies!

      Do you know someone who you think my benefit from our services? Let us know and we will get in touch with them!

      Read More
      Refer a Friend

      What Our Clients Say

      • I highly recommend PC Technologies for any of your IT and/or computer needs
        Practice Manager at Robert GR Lang, MD Inc

        Jeff has provided computer components and IT services to our medical practice since 2007. He has seen us through a system conversion, office move, and EMR implementation, providing the peripherals and support needed to make a smooth transition each time. He and his staff are prompt, professional, and price conscious. I highly recommend PC Technologies for any of your IT and/or computer needs

      • Gets it fixed fast

        Jeff and his staff installed a major computer upgrade for my office. There was no down time for my staff, the system works great and whenever there's glitch, Jeff, or one of his staff, gets it fixed fast.

      • No more having to take the computer into the store
        Director at Washington Gemological Laboratory

        I have relied on Jeff and his crew for not only minor 'bugs' that occur but also for swapping out the entire data from an older laptop into the one I currently use. They have always been able to do the job and quickly. Most of the time they are able to resolve the issue over the phone, while controlling my computer from their office. Love it!! Makes my life so much easier. No more having to take the computer into the store.

      • Jeff is the IT consultant for our company.
        Citizen Action Network at Freedom Foundation

        He goes the extra mile to ensure that all of our computer infrastructure is running smoothly. When we do encounter problems Jeff is quick to respond. He has become integral to our team--so much so, we should call him a staff member rather than a consultant.

      • PC Tech is a great place to get all of your IT needs.
        Branch Manager / Loan Officer at Weststar Pacific Mortgage

        Jeff is always available and works with you on the best possible solutions to ones needs. I would recommend PC Tech to anyone that is running a business and does not want to deal with IT.

      • Jeff is able to bridge the gap between IT professional and customer relationships very well.
        Board Member at Seattle Search Network

        I've recommended him to clients that are in need of IT services many times. Jeff is highly skilled in IT and understands the changing trends and its impact to the small business owner. I'd highly recommend Jeff to others seeking for an IT professional.

      Check out our Videos!

      Latest Blogs

      Controlling Distractions Can Improve Productivity

      How Distractions Impede Productivity

      Did you know that the average worker in the United States gets distracted from their work every 11 minutes? When this happens, it also takes them 25 minutes to refocus on their tasks. This all adds up in the long term, and it can even bleed into the quality of work that does get done. More complicated tasks naturally take even more time to refocus.

      Workplaces naturally want to get as much productivity out of their employees as they can reasonably expect, so this turnaround is not particularly great. Therefore, it is in the employer’s best interests to minimize distractions in the workplace. The first step is admitting that distractions are a problem; only after this has happened can you begin to take the next steps toward resolving the problem. There are two different types of distractions: external and internal.

      Identifying Internal and External Distractions

      Most distractions are bad and counterproductive, but it’s worth understanding the difference between external and internal distractions, as well as how they can influence productivity.

      First, let’s define external distractions. These are all over the place in the business environment in the form of emails, phone calls, instant messages, pop-up meetings, etc. These external distractions can all happen when we least expect them, forcing the user to shift focus and away from the task at hand. While external distractions come from external issues, internal distractions are those that the user creates from within themselves, such as mental blocks, an inability to prioritize tasks or weigh options appropriately. It’s like looking at a restaurant menu; too many choices makes the decision difficult, whereas fewer choices expedites the decision-making process.

      Some workplaces build-out schedules for employees, so this is not necessarily a perfect comparison, but it is a fair concern to have. In this case, the internal distractions that come from an inability to prioritize tasks are not their fault. If everything is a priority, then nothing is a priority. Employees will be forced to make their own tough calls in these situations, and their thought processes regarding these tough calls might lead to doing tasks out of order or in an inefficient way.

      Internal distractions can also manifest themselves in the form of wandering thoughts or planning for future tasks rather than focusing on the current one. When internal and external distractions are combined, even the most dedicated employee might have trouble focusing on their work. It is possible to overcome these distractions, though; it just takes some hard work and best practices.

      How to Minimize Distractions

      Eliminate Options

      If we look at the above scenario with the menu, the problem of having too many options can be mitigated by removing some of them. Eliminating options means that less time is spent on decisions and, therefore, fewer distractions get in the way of making up your mind. One way you can eliminate options is by simply cleaning up your area and eliminating distractions. If you spend a little time doing this, you might be surprised by how much time it actually saves.

      Set Limits

      A clear goal in mind can help you stay focused on it, but identifying the specific endpoint can have the same effect. Give yourself a set amount of time to work on a task, then transition to the next one. This does a couple of things for productivity. On one hand, it keeps the mind fresh and keeps tasks from growing stale. On the other, if you give yourself a set amount of time to work on a task, chances are that you will spend that amount of time on it. A common saying is that work expands to fit the time scheduled for it, so you might even find yourself ahead of schedule for a change.

      Control your Environment

      If you can control your environment, you can control your focus. If you struggle with a noisy atmosphere, then you can put some headphones on to keep noise to a minimum. If there is something distracting going on in the office, you can instead take a laptop and work elsewhere in the office. Changing your environment can be empowering and allow you to remove yourself from distracting situations.

      If you find yourself struggling with distractions, try using some of these strategies to make the workplace more conducive to productivity. What are some strategies that you might recommend to your peers and colleagues? Let us know in the comments, and be sure to subscribe to our blog.

      Learn More

      Use These 3 Services to Boost IT Efficiency

      An IT services provider can effectively take over most, if not all aspects of a business’ IT management. Here are some of the major ways that managed IT services can provide value for your organization.

      Remote Monitoring and Management

      An IT service provider like PC Technologies can help your business keep its technology in proper working order. Hardware failure might be devastating, but assets like devices can be replaced; the time thrown down the drain as a result of hardware failure cannot. Instead of reacting to hardware failure and other problems related to your IT, our certified technicians can use the latest technology to monitor your infrastructure for telltale signs or oddities that must be addressed. This proactive approach allows us to keep a close watch on your technology so you don’t have to, preventing downtime and keeping you focused on running your business.

      Cyber and Network Security

      You don’t need us to tell you (or maybe you do) that malware and other hacking attacks are major causes for concern. Security should be top-of-mind for any organization that wants to get anything done. PC Technologies understands the importance of business security, and we want to help you keep your organization safe as can be with the latest security tools and solutions. We can help you implement security measures, develop policies and procedures to augment them, and monitor your network for any signs of threats. You can rest easy knowing that we’ve got you covered.

      Tool Procurement and Deployment

      The IT technician is much more than the occasional office visitor who stops by to resolve computer problems. While this makes up a good portion of what we do, our technicians understand that IT bleeds into every other facet of your organization. This includes the procurement of new technology solutions and the support required to make the most of them. We’ll make sure that any new tech deployment is successful. From design to implementation to support, you can count on PC Technologies to help make sure any additions to your IT infrastructure are carried out in a competent and professional manner.

      As you can see, the right IT solutions can improve your organization’s productivity and efficiency in spades. Don’t wait any longer to get started with managed services; give PC Technologies a call today at 360-491-2227.

      Learn More

      Ransomware Has Gotten So Bad, It’s Aligned with Terrorism

      How Much Worse Has Ransomware Gotten?

      Let’s look at this somewhat casually. 

      Ransomware was never something to be trifled with. However, compared to the attacks we’re seeing today, the attacks of the past seem to be small potatoes at their worst. Having your business’ data encrypted is bad. However, crippled supply chains and interrupted national infrastructures (as we’ve seen in the recent attacks on JBS SA and Colonial Pipeline) are undoubtedly worse.

      The dangers that such ransomware attacks pose cannot be understated, and no business is truly safe. The White House recently said as much in their warning to companies in regards to their cybersecurity preparations.

      This is Why the US Justice Department is Speaking Out

      Understandably concerned about the ramifications such threats could easily pose to national security, the Department of Justice has joined with the White House to draw a line in the sand. As their way of responding to what they accurately described as a “growing threat,” investigations into ransomware cases will now be handled similarly to how terrorism cases are… all stops taken out in terms of what tools are used.

      Other Governing Bodies are Following Suit

      Likewise, in response to the JBS hack and the potential economic ramifications it will likely cause, the US Congress is now considering the lack of federal oversight into the cybersecurity protections implemented by meat processors. Such oversight could help to create a more unified strategy to help prevent and mitigate these kinds of attacks and their widespread impacts.

      Ransomware Threats are Also Getting Worse

      In addition to many ransomware attacks being waged on bigger, higher-value targets, the strategies involved across the board are evolving. Just consider the ideal progression of a ransomware attack from the attacker’s perspective.

      1. Use ransomware to encrypt a targeted system
      2. Threaten to delete all contents of a targeted system if a ransom isn’t paid
      3. Profit

      Understanding this, the consensus amongst security-minded businesses was that keeping an isolated backup was the perfect failsafe against such an attack. After all, with the backup to fall back on, the encrypted data could be deleted and replaced with relatively minor cost to the business. This is one of the many, many reasons we always recommend a business to keep a backup squirreled away.

       Unfortunately, as will always be the case with cybercriminals, these practices encouraged them to adapt their processes. Lately, more and more attacks are following a slightly different method than what we’ve been seeing:

      1. Steal data from a system, using ransomware to encrypt it after the data has been harvested
      2. Threaten to delete all contents of a targeted system if a ransom isn’t paid
      3. Profit
      4. Threaten to leak or sell the stolen data unless a second ransom is paid
      5. Profit again

      This double-whammy approach to ransomware first came onto the scene in late 2019, and has exploded since. One recent survey found that 77 percent of ransomware attacks now come with threats to leak data if a ransom isn’t paid. This same survey also revealed that such attacks are increasingly directed against SMBs, who have considerably fewer resources than enterprise-level targets.

      So, if keeping a backup no longer helps to squash the entire threat, what can a company do?

      How a Business Can Resist Ransomware

      First, it will help to understand how the majority of modern ransomware attacks begin. About half are enabled by a cybercriminal’s ability to compromise remote desktop software (through stolen or guessed access credentials, or through an unpatched vulnerability). This means that any organization can more effectively prevent ransomware by reinforcing its password security and user management.

      By implementing password requirements that better align to best practices and then reinforcing them through two-factor authentication measures, your business can help eliminate much of the risk of an insecure password. Supplementing these measures with a password management platform can make it that much simpler for your users to utilize sufficiently secure identity authentication, benefitting your organization considerably.

      Finally, it helps to invest in a dark web monitoring service, as this can help you identify if any of the passwords or data that your organization relies on has been compromised and exfiltrated. While it won’t help to undo any damage that has already been done as a result, this knowledge can help you identify your weak points and resolve them.

      While we wish we could say that this is the last time that a cyberattack method will ever get progressively worse, we simply can’t, so we all need to do whatever we can to stop them. That’s where PC Technologies and our services come in. Learn more about what you need us to do by calling 360-491-2227.

      Learn More

      Know someone who would benefit from PC Technologies? Let us know!

      Latest Blog Entry

      Technology is such a wonderful tool for productivity, but one thing that you need to understand is that it cannot work miracles. At the end of the day, we are all still human; distractions creep in that technology cannot prevent. Some users struggle with staying focused, whi...

      Latest News

      5:01 Surge! After Hours Business Block Party July 29th

      Let PC Technologies kick off your 2021 summer with a Business Block Party! Enjoy an evening of networking with the Lacey South Sound Chamber. Attendees can look forward to exclusive raffle items and networking opportunities. This is an after-hours event you won't want to miss!

      Read more ...

      Account Login