Get Started Today!  360-491-2227

The Thurston, Pierce, Lewis, and Mason Counties IT Experts


We work hard behind the scenes so annoying technology issues don't slow your business down.

Our mission is to help businesses like yours increase productivity and get more out of the technology you invest in.
We specialize in solutions that safeguard and protect your data and keep operations running smoothly.

Managed IT Services

Intelligent remote monitoring, proactive maintenance, and behind-the-scenes remote support.

read more

 

Network Security

Protect your business from threats like malware, viruses, phishing attacks, hackers and other threats.

read more

Backup & Disaster Recovery

Ensure peace-of-mind in any situation with the most complete data backup solution available.

read more

Cloud Hosting Solutions

Reduce infrastructure costs, collaborate, and get more done with our unique cloud solutions.

read more

When you just want IT to work!

There are a lot of computer shops out there that you can call up to fix an issue or install a piece of equipment. They might be able to get you out of crisis mode, but they aren’t looking at the full picture.

At PC Technologies, we understand business. We consult. We provide solutions to solve everyday challenges. We just happen to fix computers as well.

We believe (and have proven) that if you proactively manage technology, run maintenance religiously, and monitor a business network, everyday issues and downtime will be greatly reduced.

This is what makes us different than your typical tech support company. Sure, we can fix computer issues when you have them, but our specialty is preventing them in the first place.

Are you looking for a partner you can trust your IT with? Sign up for a FREE IT Assessment to get started today.

  • First Name *
  • Last Name *
  • Company name
  • Phone *



      Who Are We?

      It's Nice To Know Who You're Working With, We Get That

      PC Technologies understands that making a decision means putting your trust in us. We encourage you to find out more about our company and read testimonials from our many satisfied customers!

      About PC Technologies

      We are not your typical business, We are your business partners

      We live by the idea that your business needs come first, so much so that our CEO W. Jeff Seeman has written a letter for you to read showing just how dedicated our team is to not only solving problems but your success!

      Read More
      Our Difference
       
      It's a Secret

      Shhh, don't tell anyone we told you!

      WARNING: We are about to let you in on a secret about how most computer companies really make their money! We will cover the three main types of IT companies and what you can expect out of them.

      Discover What It Is!
       

      Refer A Friend To PC Technologies!

      Do you know someone who you think my benefit from our services? Let us know and we will get in touch with them!

      Read More
      Refer a Friend
       

      What Our Clients Say

      • I highly recommend PC Technologies for any of your IT and/or computer needs
        Practice Manager at Robert GR Lang, MD Inc

        Jeff has provided computer components and IT services to our medical practice since 2007. He has seen us through a system conversion, office move, and EMR implementation, providing the peripherals and support needed to make a smooth transition each time. He and his staff are prompt, professional, and price conscious. I highly recommend PC Technologies for any of your IT and/or computer needs

      • Gets it fixed fast
        CPA

        Jeff and his staff installed a major computer upgrade for my office. There was no down time for my staff, the system works great and whenever there's glitch, Jeff, or one of his staff, gets it fixed fast.

      • No more having to take the computer into the store
        Director at Washington Gemological Laboratory

        I have relied on Jeff and his crew for not only minor 'bugs' that occur but also for swapping out the entire data from an older laptop into the one I currently use. They have always been able to do the job and quickly. Most of the time they are able to resolve the issue over the phone, while controlling my computer from their office. Love it!! Makes my life so much easier. No more having to take the computer into the store.

      • Jeff is the IT consultant for our company.
        Citizen Action Network at Freedom Foundation

        He goes the extra mile to ensure that all of our computer infrastructure is running smoothly. When we do encounter problems Jeff is quick to respond. He has become integral to our team--so much so, we should call him a staff member rather than a consultant.

      • PC Tech is a great place to get all of your IT needs.
        Branch Manager / Loan Officer at Weststar Pacific Mortgage

        Jeff is always available and works with you on the best possible solutions to ones needs. I would recommend PC Tech to anyone that is running a business and does not want to deal with IT.

      • Jeff is able to bridge the gap between IT professional and customer relationships very well.
        Board Member at Seattle Search Network

        I've recommended him to clients that are in need of IT services many times. Jeff is highly skilled in IT and understands the changing trends and its impact to the small business owner. I'd highly recommend Jeff to others seeking for an IT professional.

      Check out our Videos!

      Latest Blogs

      Is it Worth Pushing for a Return to Office?

      We don’t have to treat this question as a hypothetical, either. We have actual examples to consider, in terms of how employees have responded to such news.

      Mandatory RTO Hasn’t Been Taken Well in the Recent Past

      There have been a number of companies that, having successfully implemented remote work when it was deemed necessary for safe operations, elected to roll back these capabilities.

      • In May 2021, Jamie Dimon—CEO of JPMorgan—claimed that remote work “doesn’t work for people who want to hustle,” and that it also “doesn’t work for culture, doesn’t work for idea generation.” However, by April of this year, Dimon had conceded that only half of his entire workforce will return to the office full-time, with 10% remaining as full-time remote employees.

      • In April, Apple mandated that all employees needed to be in the office at least three days each week. The employees responded by forming a group (“Apple Together”) and publishing an open letter criticizing the executives’ decision.

      • In March, David Solomon, CEO of Goldman Sachs, insisted that the company’s employees make the shift back to the office full-time. Only half of the company’s employees did so.

      • Recently, Google Maps and the tech company Cognizant were convinced by their employees’ petition against a return to their Bothell, Washington offices, pushing their RTO date from June 6th to September 6th.

      • Finally—and perhaps most noticeably—Elon Musk has vocally come out against Tesla employees working from home, after emails leaked from Musk that stated, “Anyone who wishes to do remote work must be in the office for a minimum (and I mean *minimum*) of 40 hours per week or depart Tesla.” He then doubled down on his statements by saying people who thought coming into work is an antiquated concept should “pretend to work somewhere else.”

      Ouch. However, this all shows another form of resistance—not just the resistance that these employers still have against remote work, but the resistance that employees have against these return to office mandates. Many companies have taken note of this and have taken the opposite tack as the above, instead offering perks and special events for those willing to come back.

      Naturally, larger companies are able to do significant things to draw in their team members. Microsoft treated its employees in Redmond to a variety of perks—concerts by local bands, terrarium-making classes, and beer and wine tastings. Qualcomm (who makes the chips that may very well power the device you’re reading this on now) welcomed their employees back with a happy hour, and began numerous events and pop-up activities for team members.

      Of course, such activities are almost assuredly out of reach for small businesses.

      Therefore, It’s Important that You Remain Flexible, If Only to Avoid Pushback

      With unprecedented acceptance of remote work in the job market right now, you need to give your employees the level of workplace flexibility they want. The technologies that enable hybrid operations will be fundamental to doing so, which is something that we can help you implement. Reach out to us today to find out what we can offer to support your business, whether your operations are in-house, remote, or hybrid. Give us a call at 360-491-2227.

      Learn More

      Tip of the Week: Remove Duplicate Values in Excel

      How to Remove Duplicate Values in Columns

      It turns out that Microsoft Excel makes this process extraordinarily easy to pull off. There is an option built right into the program which enables you to do this. Begin by opening up whichever spreadsheet you want to remove duplicate values in.

      Next, select the cells which comprise the spreadsheet. If you want to do the whole spreadsheet, you can use Ctrl + A to select the entire thing.

      The next step is to go to the Data tab and select the Data Tools button in the ribbon. From here, you select Remove Duplicates from the drop-down menu. A menu should open up with some options to choose from. If you want to keep your headers, if your spreadsheet uses them, then select the box for My data has headers. This will ignore the first row of your spreadsheet.

      Underneath this option, you should see the list of columns in your spreadsheet. Select the columns for which you want to delete duplicate values. To make things easier, you can use the Select All or Unselect All options at the top of the box. Once you are ready, you can click OK. A dialog box will appear telling you how many duplicate values have been deleted, as well as how many unique values remain.

      And that’s it! Super easy, right?

      What are some other tips you would like to see from us in the future? Be sure to let us know in the comments, and for more great tips and tricks, subscribe to PC Technologies’s blog.

      Learn More

      5 Steps You Can Take to Keep Your Network and Data Secure

      Control Internal Access

      For a long time, every person on a business’ computing network had access to every file and application hosted on it. Over time, this caused a lot of problems with data security. There is absolutely no reason why every employee needs access to every file on your network. In fact, it can only end poorly. Partitioning certain parts of your network and implementing access controls to get the tools (and access to files) to the employees that need them, while also minimizing your risk by limiting access to some is a best practice that all organizations should employ. 

      Control Vendor Access

      Every single business has a myriad of third-party vendors that they use. While you may know your sales representatives well, you don’t know everyone that works with them. This presents significant potential risk. Nowadays, with data privacy laws beginning to pop up regularly, businesses that don’t have some semblance of access control for their vendors could stand to face civil or even criminal legal action, let alone compliance fines and reputational harm. If your vendors demand access to your network, you have the right to demand transparency in return. If they cannot (or won’t) offer that, you need to rethink your business agreement.

      Train Your People

      One of the most important parts of having a strong cybersecurity posture is implementing a comprehensive cybersecurity training regimen for your employees. This includes how to properly create passwords that protect their employee accounts, how to spot potential phishing messages, and why they need to be active participants in protecting your business’ network and data. Nowadays, a majority of outside threats are aimed at getting employees to grant access to accounts so that cybercriminals can plant malware, siphon data, and even steal money. The better prepared your employees are for this eventuality, the more secure your business’ network and data will be. 

      Patch Your Software

      Another major avenue of attack is through vulnerabilities created by software that hasn’t been updated properly or timely patched. Most software your business relies on is constantly developed by the company you get it from and if you don’t consistently make an effort to keep every server, workstation, or networking device updated, new vulnerabilities will form. This can be a real problem for your business. 

      Develop a Security Plan

      Finally, not every threat is going to be caught by security software and not every vulnerability is going to be consistently caught by infrequent penetration testing. You need to have a dedicated cybersecurity response process in place that will direct your organization in the right direction should there be a network breach. It takes an average of three-quarters of a year for most network breaches to be detected. By then, it is difficult to mitigate the damage done. A business’ reputational damage is significant if a data breach happens, and if you don’t have a plan of attack to get out in front of it by evaluating what happened, what was taken, and resolve it quickly, things will certainly get worse. 

      At PC Technologies, we work with Thurston, Pierce, Lewis, and Mason Counties businesses to help them secure their network and data, come up with policies, procedures, and training platforms to help mitigate the chances of a data breach, and manage the lingering negative effects that a lack of network security can have on your business. To have a conversation about how we can improve your business’ security posture, call us today at 360-491-2227. 

      Learn More

      Know someone who would benefit from PC Technologies? Let us know!

      Latest Blog Entry

      Now, you may or may not have already made the transition back to the office, and this really applies more to those who haven’t yet. However, even those who have may find some utility here—specifically, in determining if a push to a full return to office was the right move. L...

      Latest News

      5:01 Surge! After Hours Business Block Party July 29th

      Let PC Technologies kick off your 2021 summer with a Business Block Party! Enjoy an evening of networking with the Lacey South Sound Chamber. Attendees can look forward to exclusive raffle items and networking opportunities. This is an after-hours event you won't want to miss!

      Read more ...

      Account Login