Get Started Today!  360-491-2227

The Thurston, Pierce, Lewis, and Mason Counties IT Experts


We work hard behind the scenes so annoying technology issues don't slow your business down.

Our mission is to help businesses like yours increase productivity and get more out of the technology you invest in.
We specialize in solutions that safeguard and protect your data and keep operations running smoothly.

Managed IT Services

Intelligent remote monitoring, proactive maintenance, and behind-the-scenes remote support.

read more

 

Network Security

Protect your business from threats like malware, viruses, phishing attacks, hackers and other threads.

read more

Backup & Disaster Recovery

Ensure peace-of-mind in any situation with the most complete data backup solution available.

read more

Cloud Hosting Solutions

Reduce infrastructure costs, collaborate, and get more done with our unique cloud solutions.

read more

When you just want IT to work!

There are a lot of computer shops out there that you can call up to fix an issue or install a piece of equipment. They might be able to get you out of crisis mode, but they aren’t looking at the full picture.

At PC Technologies, we understand business. We consult. We provide solutions to solve everyday challenges. We just happen to fix computers as well.

We believe (and have proven) that if you proactively manage technology, run maintenance religiously, and monitor a business network, everyday issues and downtime will be greatly reduced.

This is what makes us different than your typical tech support company. Sure, we can fix computer issues when you have them, but our specialty is preventing them in the first place.

Are you looking for a partner you can trust your IT with? Sign up for a FREE IT Assessment to get started today.

  • First Name *
  • Last Name *
  • Company name
  • Phone *



      Who Are We?

      It's Nice To Know Who You're Working With, We Get That

      PC Technologies understands that making a decision means putting your trust in us. We encourage you to find out more about our company and read testimonials from our many satisfied customers!

      About PC Technologies

      We are not your typical business, We are your business partners

      We live by the idea that your business needs come first, so much so that our CEO W. Jeff Seeman has written a letter for you to read showing just how dedicated our team is to not only solving problems but your success!

      Read More
      Our Difference
       
      It's a Secret

      Shhh, don't tell anyone we told you!

      WARNING: We are about to let you in on a secret about how most computer companies really make their money! We will cover the three main types of IT companies and what you can expect out of them.

      Discover What It Is!
       

      Refer A Friend To PC Technologies!

      Do you know someone who you think my benefit from our services? Let us know and we will get in touch with them!

      Read More
      Refer a Friend
       

      What Our Clients Say

      • I highly recommend PC Technologies for any of your IT and/or computer needs
        Practice Manager at Robert GR Lang, MD Inc

        Jeff has provided computer components and IT services to our medical practice since 2007. He has seen us through a system conversion, office move, and EMR implementation, providing the peripherals and support needed to make a smooth transition each time. He and his staff are prompt, professional, and price conscious. I highly recommend PC Technologies for any of your IT and/or computer needs

      • Gets it fixed fast
        CPA

        Jeff and his staff installed a major computer upgrade for my office. There was no down time for my staff, the system works great and whenever there's glitch, Jeff, or one of his staff, gets it fixed fast.

      • No more having to take the computer into the store
        Director at Washington Gemological Laboratory

        I have relied on Jeff and his crew for not only minor 'bugs' that occur but also for swapping out the entire data from an older laptop into the one I currently use. They have always been able to do the job and quickly. Most of the time they are able to resolve the issue over the phone, while controlling my computer from their office. Love it!! Makes my life so much easier. No more having to take the computer into the store.

      • Jeff is the IT consultant for our company.
        Citizen Action Network at Freedom Foundation

        He goes the extra mile to ensure that all of our computer infrastructure is running smoothly. When we do encounter problems Jeff is quick to respond. He has become integral to our team--so much so, we should call him a staff member rather than a consultant.

      • PC Tech is a great place to get all of your IT needs.
        Branch Manager / Loan Officer at Weststar Pacific Mortgage

        Jeff is always available and works with you on the best possible solutions to ones needs. I would recommend PC Tech to anyone that is running a business and does not want to deal with IT.

      • Jeff is able to bridge the gap between IT professional and customer relationships very well.
        Board Member at Seattle Search Network

        I've recommended him to clients that are in need of IT services many times. Jeff is highly skilled in IT and understands the changing trends and its impact to the small business owner. I'd highly recommend Jeff to others seeking for an IT professional.

      Check out our Videos!

      Latest Blogs

      What You Need to Do If Your Business is Hacked

      Damage Control

      Your first step needs to be getting a handle on the situation at hand. While hacking on any scale is a bad thing to experience, cutting it off as quickly as possible will serve you well. Here are a few steps that you need to take in order to do so:

      Contact Your IT Provider IMMEDIATELY

      If your IT provider is anything like us, they are more than likely aware of something happening on your network if they are monitoring it closely. That said, you’ll want to notify them immediately if you are suspicious of malevolent activity. 

      Depending on what the issue is, IT will take specific actions to remove the threat, mitigate the damage, and then harden your network to prevent it from happening. Threats can sometimes be removed easily, or it could take a lot of hunting to chase down the cause of the problem if it isn’t being done proactively.

      Here’s an example of a nightmare recovery scenario. IT may decide it’s best to take the nuclear option and wipe all affected devices completely before restoring them from a data backup. Doing so should remove the chance that a lingering threat could continue causing problems. We strongly recommend that you reach out to us for assistance with this, as we’ve seen plenty of cases where the business goes through an intense amount of labor only to experience the same hack after everything is back online. It has to be done carefully, and it has to be done correctly, and even then, the risks are still there.

      Once that’s been accomplished, you need to be sure that all of your cybersecurity protections are fully updated and that you are as secure as possible. Check your firewalls, antivirus, spam protection, everything.

      Seek Out Assistance

      Many small businesses fully place their IT issues (or more accurately, dealing with them) on their staff members. Obviously, this isn’t a good situation. For a business’ purposes, it is much better to have a professional, dedicated resource to answer any questions your team has. A solid and reliable expert, like the ones that we employ here at PC Technologies, can be key to making it through these kinds of situations in the best position possible.

      Be Prepared to Inform Clients and Prospects

      Finally, we come to the last (but by no means least) part of making it through a cybersecurity incident: disclosing it. Of all of your interactions with your clientele or staff, this is the time when clarity and concision is most crucial. Bring everyone up to speed on the situation, what the possible ramifications are, and what needs to be done next to minimize the damage the event ultimately causes.

      The hard truth of the matter is that you will ultimately lose some people when this happens. Of course you will. While the data practices of some people in their personal lives are questionable at best, the onus is still on you if they’ve entrusted you with the same data… and they’re not wrong. This means that you are accountable, and therefore need to be open and forthcoming with anyone involved. Every state and most industries have their own rules and requirements for data privacy, so you’ll want to understand exactly how you need to handle the communication involved with a data breach disclosure, based on what information was potentially breached.

      Prepare Ahead of Time

      Granted, these tips won’t help much if you’re already struggling through a breach event… but they will help you prepare for any you may face in the future. Taking the initiative to be proactive in implementing your protections and enforcing best practices will only boost your essential protections during this time (and trust us, the risks that today’s online workplace presents make these kinds of boosts necessary),

      For assistance with your cybersecurity protections and the rest of your IT, you can always lean on us. Learn more about our services by calling 360-491-2227 today.

      Learn More

      Getting Accessible Internet to the Disabled Isn’t So Easy

      The Less Inclusive Internet

      We all use the Internet for multiple purposes, and we all get extremely annoyed when we come across a webpage or an app that is poorly designed and provides a terrible user interface. For people with disabilities it can be even more frustrating. In fact, for some, it makes getting the goods and services they desperately need all but impossible to do online. 

      Defining Accessibility 

      In the context we mean here, accessibility is basically the usability of a website or app. When people can’t properly navigate, understand, and successfully interact with a web-based platform, its accessibility is limited.

      A few standards have been outlined, known by the acronym POUR: 

      1. Content and the overall user interface must be perceivable by everyone, accounting for those who rely primarily on visuals as well as those who require sound or tactile input.
      2. A website must be operable, which requires that those with limitations must be able to identify and navigate through different elements of a webpage.
      3. A user must also find the website understandable, with the information presented on it in such a way that the meaning is clear, and the formatting is consistent.
      4. Finally, a website must be robust, which here means capable of operating properly on a variety of technologies—including assistive technologies.

      As the COVID-19 pandemic hit, social distancing guidelines were implemented, making the accessibility of services to people with disabilities extremely important. With everyone thrust into a new system, the inconsistency of the accessibility of applications and websites became frightfully apparent. In America, one-in-every-four people have been diagnosed with some form of disability, so the pandemic made things difficult for nearly a billion people. 

      Common Disabilities

      Here are a few common disabilities that may make it difficult to work with web pages and apps that don’t work: 

      1. Visual disabilities, including blindness, color blindness, and low vision.
      2. Hearing disabilities, including deafness and hearing impairments.
      3. Neurological disabilities, including conditions and disorders that impact the nervous system.
      4. Cognitive disabilities, including those that impact attention, learning, and logic.
      5. Motor disabilities, including those that limit fine motor skills, slow muscles, or prevent the full use of one’s hands.

      These are officially listed in the Web Content Accessibility Guidelines, a standard that was created by the World Wide Web Consortium and specifically designed to establish some basic oversight over the Internet. It became clear that it woefully neglects some people with disabilities. The WCAG has been a foundational guideline for disabled Internet use around the globe. This includes Title III of the Americans with Disabilities Act (ADA), while others (like the European Standard EN 301 549 of the EU Web Accessibility Directive) incorporate the WCAG’s guidelines into its own contents.

      While it’s a good start, these guidelines still seemingly come up short. 

      The pandemic exposed the lack of inclusivity. Take a look at the state unemployment sites. Based on research completed by the Information Technology and Innovation Foundation, 86 percent of these sites failed at least one basic evaluation for mobile loading speed, mobile friendliness, or accessibility. 

      Additionally, telehealth interfaces, something that has gained a lot of traction during the pandemic, have been exposed for their lack of usability, consistency, and availability of services like closed captioning have underperformed. 

      Furthermore, a survey conducted by Pew Research Center in 2016 revealed that adults with disabilities were about 20 percent less likely to own the technology needed, which is either a computer or mobile device, and the at-home broadband connectivity needed to run these platforms as many disabled people are living on a fixed budget and don’t have the resources to purchase these goods and services.

      It is going to be extremely important, with social distancing likely extending into 2022, that more is done to provide disabled people with the accessibility to technology they require for certain situations. Of course, web-based applications and websites are crucial to a lot of people, not just the disabled. Education, healthcare, financial services, and more have to do more to make their applications usable for people as they depend on them during this difficult time. 

      Have you had difficult experiences with technology in the last year? What do you think should be done about the lack of accessibility to easy-to-use applications and web interfaces? Leave your thoughts in the comments section below and check back at our blog soon for more great technology content.

      Learn More

      Tip of the Week: Keeping Peeping Eyes Out of Your Webcam

      Keep Your Software Up to Date

      To spy on you through your webcam, a cybercriminal (which is what that person would be) needs to have access to it. This can be as simple as simply hijacking an insecure program that has already been granted this desired access.

      Keeping your software up to date helps to eliminate the likelihood that the hacker will have that opportunity, from the programs and apps you have installed to the operating system itself. When working on a PC, navigating to Settings and to Update & Security will bring you to the option to schedule your Windows Update. Rather than being interrupted mid-workflow, you can Change active hours to have these updates implemented after hours.

      Maintain a Firewall

      When it comes to keeping unwanted guests out of your network, a firewall is one solution you certainly need to prioritize. Making sure it is up, activated, and effective is a relatively simple process.

      In Settings, once again under Update & Security, you should find Firewall & network protection in the left sidebar. The menu that opens when you click it will offer Windows Defender Firewall, one rudimentary way to stave off threats. This is a good enough solution for home users, but businesses will want to deploy an enterprise-level firewall that is designed to protect every facet of their network.

      Securing Your Wi-Fi

      It isn’t uncommon that attackers will target your network via the router, rather than the computer that uses it to connect to the Internet. If they can access this piece of your network infrastructure, there’s a considerable list of devices they’ll then be able to access. Better securing your router equates to better securing your entire network.

      The first step is to rename your wireless network to something that doesn’t tie back to your business and lock it down with a strong, complex password. You’ll need to remember it, of course, but using a passphrase with some added symbols and alphanumeric switching will help keep it memorable to you and bamboozling to cybercriminals.

      Cover Up Your Webcam

      If you’re really and truly worried that someone may be peeping at you through your webcam, the simplest way to prevent the possibility is to simply obscure their view. Covers are available to make it simple to “deactivate” the camera when it is not needed, and in a pinch, a sticky note will do the job just fine.

      Privacy always needs to be prioritized, in the office, the home, and in the home office. For more tips, practices, and advice on keeping your data secured, make sure to check back on our blog every few days.

      Learn More

      Know someone who would benefit from PC Technologies? Let us know!

      Latest Blog Entry

      Few things are scarier for a modern business to consider than the idea that they will be hacked, regardless of that business’ size or industry. After all, hacking can, will, and does cause significant damage across basically all aspects of your organization. This is precisel...

      Latest News

      PC Technologies launches new website!

      PC Technologies is proud to announce the launch of our new website at www.pctechnologies.net. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account Login