The Thurston, Pierce, Lewis, and Mason Counties IT Experts


We work hard behind the scenes so annoying technology issues don't slow your business down.

Our mission is to help businesses like yours increase productivity and get more out of the technology you invest in.
We specialize in solutions that safeguard and protect your data and keep operations running smoothly.

Managed IT Services

Intelligent remote monitoring, proactive maintenance, and behind-the-scenes remote support.

read more

 

Network Security

Protect your business from threats like malware, viruses, phishing attacks, hackers and other threads.

read more

Backup & Disaster Recovery

Ensure peace-of-mind in any situation with the most complete data backup solution available.

read more

Cloud Hosting Solutions

Reduce infrastructure costs, collaborate, and get more done with our unique cloud solutions.

read more

When you just want IT to work!

There are a lot of computer shops out there that you can call up to fix an issue or install a piece of equipment. They might be able to get you out of crisis mode, but they aren’t looking at the full picture.

At PC Technologies, we understand business. We consult. We provide solutions to solve everyday challenges. We just happen to fix computers as well.

We believe (and have proven) that if you proactively manage technology, run maintenance religiously, and monitor a business network, everyday issues and downtime will be greatly reduced.

This is what makes us different than your typical tech support company. Sure, we can fix computer issues when you have them, but our specialty is preventing them in the first place.

Are you looking for a partner you can trust your IT with? Sign up for a FREE IT Assessment to get started today.

  • First Name *
  • Last Name *
  • Company name
  • Phone *



      Who Are We?

      It's Nice To Know Who You're Working With, We Get That

      PC Technologies understands that making a decision means putting your trust in us. We encourage you to find out more about our company and read testimonials from our many satisfied customers!

      About PC Technologies

      We are not your typical business, We are your business partners

      We live by the idea that your business needs come first, so much so that our CEO W. Jeff Seeman has written a letter for you to read showing just how dedicated our team is to not only solving problems but your success!

      Read More
      Our Difference
       
      It's a Secret

      Shhh, don't tell anyone we told you!

      WARNING: We are about to let you in on a secret about how most computer companies really make their money! We will cover the three main types of IT companies and what you can expect out of them.

      Discover What It Is!
       

      Refer A Friend To PC Technologies!

      Do you know someone who you think my benefit from our services? Let us know and we will get in touch with them!

      Read More
      Refer a Friend
       

      What Our Clients Say

      • I highly recommend PC Technologies for any of your IT and/or computer needs
        Practice Manager at Robert GR Lang, MD Inc

        Jeff has provided computer components and IT services to our medical practice since 2007. He has seen us through a system conversion, office move, and EMR implementation, providing the peripherals and support needed to make a smooth transition each time. He and his staff are prompt, professional, and price conscious. I highly recommend PC Technologies for any of your IT and/or computer needs

      • Gets it fixed fast
        CPA

        Jeff and his staff installed a major computer upgrade for my office. There was no down time for my staff, the system works great and whenever there's glitch, Jeff, or one of his staff, gets it fixed fast.

      • No more having to take the computer into the store
        Director at Washington Gemological Laboratory

        I have relied on Jeff and his crew for not only minor 'bugs' that occur but also for swapping out the entire data from an older laptop into the one I currently use. They have always been able to do the job and quickly. Most of the time they are able to resolve the issue over the phone, while controlling my computer from their office. Love it!! Makes my life so much easier. No more having to take the computer into the store.

      • Jeff is the IT consultant for our company.
        Citizen Action Network at Freedom Foundation

        He goes the extra mile to ensure that all of our computer infrastructure is running smoothly. When we do encounter problems Jeff is quick to respond. He has become integral to our team--so much so, we should call him a staff member rather than a consultant.

      • PC Tech is a great place to get all of your IT needs.
        Branch Manager / Loan Officer at Weststar Pacific Mortgage

        Jeff is always available and works with you on the best possible solutions to ones needs. I would recommend PC Tech to anyone that is running a business and does not want to deal with IT.

      • Jeff is able to bridge the gap between IT professional and customer relationships very well.
        Board Member at Seattle Search Network

        I've recommended him to clients that are in need of IT services many times. Jeff is highly skilled in IT and understands the changing trends and its impact to the small business owner. I'd highly recommend Jeff to others seeking for an IT professional.

      Latest Blogs

      For the Average SMB, a Cost Savings of 36% Makes Cloud Migration Worth It

      As one would imagine when taking tens of thousands of servers into consideration, the reason for such shortcomings varies. In the study, it was found that one of the main obstacles holding back efficiency of on-premise virtual machines was them being over-provisioned, by as much as 26 percent of the inspected machines. In plain English, this means the virtual machines were set up to use more hardware resources than the server they were on could provide. In an interview with InformationWeek, TSO Logic’s CEO Aaron Rallo concludes, “Migrating them to the cloud and right-sizing them there would result in a 36 percent savings over their current operating cost.”

      A 36 percent cost savings is a pretty outstanding figure. For many companies, savings like this would cover the expense of migrating to the cloud, and then some. In addition to using these newly found funds to migrate to the cloud, you can invest in upgrading older server units to the latest models in order to experience even further cost savings. InformationWeek reports, “A secondary finding was that merely upgrading systems to the latest generation of servers, whether on premises or in the cloud, would also result in considerable savings. Twenty-five percent of the physical servers surveyed were more than three years old, meaning they dated back into the Intel Nehalem chip era of 2013 and its predecessors.”

      Granted, migrating to the cloud and replacing inefficient server units with newer models are two aggressive actions for an IT administrator to take, especially when one’s current IT setup seems to be meeting a company’s needs just fine. However, what this study shows is that taking such an aggressive stance toward making sure that your systems and equipment are upgraded, along with hosting data in the cloud when it’s advantageous, is worth the effort, and then some.

      Would you like to squeeze out the most efficiency and savings from your IT infrastructure as possible? How do you go about this? The answer is easy, with help from PC Technologies.

      To get started, you’ll need a thorough IT assessment of your current operations. PC Technologies can perform this task and report back to you on what improvements you can make in order to improve efficiency and save money. It’s an easy way to bolster your bottom line, and at the end of the day, shouldn’t that be what your company’s technology is all about?

      To schedule your IT assessment, call us today at 360-491-2227.

      Learn More

      What’s the Secret to Engaging Gen Y Workers?

      First of all, Millennials generally hold a strong desire to balance their professional and personal lives--or, in simpler terms, they want a life outside of the office. As a result, they will possess a rabid work ethic during their office hours if it means that their time at home is really their time. At the same time, they also want a greater level of control in how that time is balanced.

      For instance, if given the choice between spending their time commuting to the office to do their work, or working from home, the majority of Millennials would rather work from home, devoting more time to company business. Recent estimates put the number of Americans working from home at around three million, with an anticipated growth rate of 63 percent in five year’s time. With recent figures from Pew Research Center stating that 64 percent of Millennials want the option to work from home on occasion, that growth seems feasible.

      Also serving their desire for work/life control, Pew found that 66 percent of Millennial workers wanted to see a shift in their work hours--something a self-managed, work-from-home approach would allow.

      Secondly, a goal shared by many Millennials is to experience career growth and improvement. They want to have a mentor-pupil relationship with their boss, rather than that of a superior and an underling. Their prime motivator is self-improvement, and so they will seek challenges in order to gain more education and experience. Upward mobility is very important to the Millennial employee as well, and they are more likely to actively seek opportunities to improve their professional and/or financial standing.

      Members of Gen Y want a situation in which their individual input to the big picture is valued and validated. Therefore, it’s recommended that new hires are given smaller responsibilities in the prospect of advancing to bigger and better things.

      They also crave feedback and evaluation following their accomplishments and their failures. By giving a young employee regular responses to their work, you can teach them to be a better employee while simultaneously allowing them to feel valued and work harder toward improving. An important thing to keep in mind is that Millennials will strive to grow one way or another, and so if they are unable to do so at your company, they will move on to other opportunities.

      Finally, Millennials were raised among more technology than any generation before them, and so can adapt more easily to unfamiliar systems. Again, the generation as a whole has a tendency to relish challenges, so giving them tasks where they can use your most cutting-edge solutions will give them an incentive to stay and excel on behalf of your business.

      Not sure if you have the solutions that Millennials would respond to? PC Technologies can equip your business with the latest and greatest technologies that Millennial workers prefer. Call us at 360-491-2227 to learn more.

      Learn More

      Tip of the Week: How You Can Beat These 4 Common Scams

      Change Passwords Frequently
      Passwords are one of the most common ways that accounts and data are protected, for both commercial and personal uses. As such, you’ll see a wide array of different passwords that could be used, which means that you’ll see easy-to-remember passwords like “password” or “123456.” To keep your business from falling victim to this vulnerability, consider the following best practices:

      • Make your passwords long (at least 16 characters). The longer, the better, as this makes the passwords more difficult to guess.
      • Make your passwords complex. Use a plethora of special characters, numbers, and both upper and lower-case letters.
      • Never use the same password twice. When a hacker steals a password, they may try to use it on other related accounts.

      A password manager can make these tips much easier to follow, as you can create complex passwords and share them across your organization’s network. You can also assign users to groups so that they only have access to credentials that they need to perform their jobs correctly. These passwords can be synced to company devices in real time, and you can use complex passwords without the pain of remembering them all.

      Be Mindful of Spam
      Hackers tend to use spam as a way to move malware to many users at once. Most hackers will attempt to spread malware in hopes of infecting as many computers as possible, while others will reach out to unwary users to steal credentials or sensitive information. Here are some of the most common spam messages that you’ll encounter, and how to respond to them.

      • A big congratulation: These types of messages try to entice the user with the promise of a big win, like winning the lottery or a new car. It’s safe to say that messages like this are spam, and that messages that prompt you to click a link to claim a prize are dangerous and unpredictable. Just make sure that you think twice before responding to unsolicited messages.
      • Fake law enforcement threats: Hackers know that people fear being threatened with legal action, so they take advantage of this fear by impersonating law enforcement agencies. The message claims that there will be action taken against the user unless they pay a fine. These messages appeal to the innate fear of authority, so be sure to keep an eye out for them.
      • Spear phishing tactics: Spear phishing aims to take targeted attempts to steal specific data from a user, all through using personalized messages designed to look just like the real deal. This can include details such as your personal contact information, or customized emails that look like they are from an institution you attend, like a bank. Since these attacks tend to look more legitimate than normal spam, you need to stay vigilant.
      • Whaling schemes: These types of attacks are at the top of the social engineering pyramid, as they impersonate the CEO or business owner. The scammer will use this disguise to get financial departments to wire transfer funds to offshore bank accounts. Be on the lookout for inconsistencies in contact information, and always cross-reference before assuming that the message is real.

      You’ll notice that many of these threats are based in email messages such as spam. Thankfully, you can block the majority of these threats simply by implementing an enterprise-level spam filter. This will keep threatening messages, or those suspected of not being legitimate, from even hitting your inbox in the first place. It’s a preventative measure that can be taken to limit the dangers associated with spam before they cause major issues.

      PC Technologies can provide your organization with the security tools you need to succeed. To learn more, reach out to us at 360-491-2227.

      Learn More

      Know someone who would benefit from PC Technologies? Let us know!

      Latest Blog Entry

      For business owners looking to streamline operations and get the most out of their technology, a new survey by TSO Logic analyzed 10,000 customer physical servers and 25,000 virtual machines and concluded that 45 percent of existing VMs would run more efficiently in the clou...

      Latest News

      PC Technologies launches new website!

      PC Technologies is proud to announce the launch of our new website at www.pctechnologies.net. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account Login

      Remember me