Get Started Today!  360-491-2227

The Thurston, Pierce, Lewis, and Mason Counties IT Experts


We work hard behind the scenes so annoying technology issues don't slow your business down.

Our mission is to help businesses like yours increase productivity and get more out of the technology you invest in.
We specialize in solutions that safeguard and protect your data and keep operations running smoothly.

Managed IT Services

Intelligent remote monitoring, proactive maintenance, and behind-the-scenes remote support.

read more

 

Network Security

Protect your business from threats like malware, viruses, phishing attacks, hackers and other threats.

read more

Backup & Disaster Recovery

Ensure peace-of-mind in any situation with the most complete data backup solution available.

read more

Cloud Hosting Solutions

Reduce infrastructure costs, collaborate, and get more done with our unique cloud solutions.

read more

When you just want IT to work!

There are a lot of computer shops out there that you can call up to fix an issue or install a piece of equipment. They might be able to get you out of crisis mode, but they aren’t looking at the full picture.

At PC Technologies, we understand business. We consult. We provide solutions to solve everyday challenges. We just happen to fix computers as well.

We believe (and have proven) that if you proactively manage technology, run maintenance religiously, and monitor a business network, everyday issues and downtime will be greatly reduced.

This is what makes us different than your typical tech support company. Sure, we can fix computer issues when you have them, but our specialty is preventing them in the first place.

Are you looking for a partner you can trust your IT with? Sign up for a FREE IT Assessment to get started today.

  • First Name *
  • Last Name *
  • Company name
  • Phone *
    ✓ Valid



      Who Are We?

      It's Nice To Know Who You're Working With, We Get That

      PC Technologies understands that making a decision means putting your trust in us. We encourage you to find out more about our company and read testimonials from our many satisfied customers!

      About PC Technologies

      We are not your typical business, We are your business partners

      We live by the idea that your business needs come first, so much so that our CEO W. Jeff Seeman has written a letter for you to read showing just how dedicated our team is to not only solving problems but your success!

      Read More
      Our Difference
       
      It's a Secret

      Shhh, don't tell anyone we told you!

      WARNING: We are about to let you in on a secret about how most computer companies really make their money! We will cover the three main types of IT companies and what you can expect out of them.

      Discover What It Is!
       

      Refer A Friend To PC Technologies!

      Do you know someone who you think my benefit from our services? Let us know and we will get in touch with them!

      Read More
      Refer a Friend
       

      What Our Clients Say

      • I highly recommend PC Technologies for any of your IT and/or computer needs
        Practice Manager at Robert GR Lang, MD Inc

        Jeff has provided computer components and IT services to our medical practice since 2007. He has seen us through a system conversion, office move, and EMR implementation, providing the peripherals and support needed to make a smooth transition each time. He and his staff are prompt, professional, and price conscious. I highly recommend PC Technologies for any of your IT and/or computer needs

      • Gets it fixed fast
        CPA

        Jeff and his staff installed a major computer upgrade for my office. There was no down time for my staff, the system works great and whenever there's glitch, Jeff, or one of his staff, gets it fixed fast.

      • No more having to take the computer into the store
        Director at Washington Gemological Laboratory

        I have relied on Jeff and his crew for not only minor 'bugs' that occur but also for swapping out the entire data from an older laptop into the one I currently use. They have always been able to do the job and quickly. Most of the time they are able to resolve the issue over the phone, while controlling my computer from their office. Love it!! Makes my life so much easier. No more having to take the computer into the store.

      • Jeff is the IT consultant for our company.
        Citizen Action Network at Freedom Foundation

        He goes the extra mile to ensure that all of our computer infrastructure is running smoothly. When we do encounter problems Jeff is quick to respond. He has become integral to our team--so much so, we should call him a staff member rather than a consultant.

      • PC Tech is a great place to get all of your IT needs.
        Branch Manager / Loan Officer at Weststar Pacific Mortgage

        Jeff is always available and works with you on the best possible solutions to ones needs. I would recommend PC Tech to anyone that is running a business and does not want to deal with IT.

      • Jeff is able to bridge the gap between IT professional and customer relationships very well.
        Board Member at Seattle Search Network

        I've recommended him to clients that are in need of IT services many times. Jeff is highly skilled in IT and understands the changing trends and its impact to the small business owner. I'd highly recommend Jeff to others seeking for an IT professional.

      Check out our Videos!

      Latest Blogs

      You Need to be Mindful of Wearable Tech

      Wearable Technology

      Wearable technology as it is understood by most people is typically the use of fitness trackers or smart jewelry, but it can extend into innovative new technologies such as virtual reality headsets. In business, most of the time you will be dealing with endpoints such as smartwatches that must be considered if they are going to have access to your network, either directly through Wi-Fi or through access to your employees’ smartphones. 

      What is crucial is data security inside a business environment. Many wearable devices don’t meet the demands of many of the compliance standards that your business may operate under, including HIPAA. More than that, since these devices get push notifications from an individual’s smartphone, they have some potential vulnerabilities that need to be addressed. Unfortunately, these devices often have a limited UI, making it difficult for organizations to improve the data security of the applications pushing communications to wearable technology.

      What You Need to Do to Ensure Wearables Don’t Pose Security Risks

      The first thing you need to do when you have people bringing devices onto your business’ network is to concoct a reliable Bring Your Own Device (BYOD) policy. This will help to define how these devices can be used within the confines of a workplace. Many organizations have built their BYOD policy with smartphones in mind, but it is important that any BYOD policy is revised to cover the appearance of other Internet-connected devices. 

      Once your policies are ironclad and put in place, you need to have the management that this technology requires. This requires a reliable and robust Mobile Device Management (MDM) platform that can control all the mobile endpoints brought onto the network. With proper management and control over these devices, the chances of a wearable vulnerability affecting the network is reduced significantly.  

      The truth is that people love new and exciting technology, and wearable technology will continue to grow and integrate itself into the business’ IT strategy. If you would like to learn how to properly secure your business’ IT from wearables to servers, give the IT professionals at PC Technologies a call today at 360-491-2227.

      Learn More

      How to Configure a Reliable Backup and Disaster Recovery Setup for Your Business

      Let’s talk about some of the things that should be included in your backup and disaster recovery (BDR) preparations.

      What Should Be Involved in Your Business’ BDR?

      We always recommend that your backup strategy follow what is commonly known as the 3-2-1 Backup rule. This rule can be summed up as follows:

      • You maintain at least three copies of your data
      • This data should be stored in at least two different storage media
      • One of these copies should be maintained offsite, ideally, in the cloud

      These are the basics. However, for some additional value, we can go a bit deeper into the weeds and describe what a good backup will need.

      Optimal Elements of a BDR that’s Designed for Success Include:

      Image-Based Backups

      Which sounds quicker to you: recreating each file that was lost individually, or dropping in a complete copy of your data storage all at once? This is the “magic,” of sorts, that image-based backups provide. Time is of the essence in a data loss situation, so the faster data can be restored, the better.

      Redundant Elements

      While redundancy isn’t often a good thing, backups are a shining exception. The more redundant your data is, the better, because you’ll know that you have a spare if something happens to one copy. However, your redundancy doesn’t have to stop there (and really shouldn’t). You need to make sure that your backups have guaranteed power, for instance, making redundant power supplies a necessity. The same goes for Internet connectivity—running multiple connections helps ensure you’ll retain access.

      Protections and Defenses

      Finally, you need to be sure that your backups aren't going to suffer from various security issues. It wouldn’t be good if your backups were infected by ransomware, for instance, or if someone managed to steal the data as you were backing it up. Therefore, you should have all of the protections you would have at your place of business also implemented where your backups are, and always make sure your transmitted data is appropriately encrypted.

      PC Technologies is here to help you make the most of your backup and disaster recovery planning. Learn more by reaching out at 360-491-2227.

      Learn More

      What You Need to Have a Solid Recovery Strategy

      Infonomics and Your Data’s Value

      Your business’ data has a certain value to you, and depending on whose data it is, to your clients, vendors, employees, and whomever else trusts you enough to share their personal data with you. At any rate, any data loss is a big deal; and nowadays it has become a large field of study called infonomics. Infonomics can put an actual dollar value on the data your organization has on hand and uses some very poignant questions to do so. These questions include:

      • How much capital would replacing the data cost? 
      • How much and what percentage is your organization’s data?
      • What kind of revenue could your organization see if it were to buy and sell it? 
      • What will it cost to completely protect the data? 

      These questions will go a long way toward making you understand exactly what kind of data you need to protect in order to keep your business from suffering some of the negative circumstances brought on by data loss. Let’s take a look at some concepts you need to understand if you are going to successfully protect your organization's data.

      Data Backup

      The first is one of the most obvious. In order to keep data from being lost, many organizations roll out comprehensive data backup systems that take snapshots of data as it changes. This provides an extraordinarily useful tool for network administrators to have if the data is corrupted or has been lost or damaged somehow.

      At PC Technologies, we offer a backup and disaster recovery service that features incremental backups that are stored both locally in a network-attached device, and offsite in a secure data center. The total data redundancy ensures that you will always have access to the data you need, when you need it. 

      Disaster Recovery

      The disaster recovery part of the BDR is not to be taken lightly. For data recovery, you make contingencies for situations and hope that you never have to use them. The two main factors in a disaster recovery platform are:

      • Recovery Point Objective (RPO) - The amount of time that your core business processes can be interrupted before your business begins to fail.
      • Recovery Time Objective (RTO) - The amount of time your business can withstand interruption before it can be considered a complete break in continuity. 

      The shorter the duration of RPO and RTO, the more diligent you have to be in keeping data ready for recovery. In managing your organizational expectations in regard to business continuity, it is essential that any strategy has succinctly taken into account the disaster recovery metrics. These will always dictate how you need to approach data recovery. 

      At PC Technologies, we take data redundancy extremely seriously, and would like to help your organization set up a backup and disaster recovery platform that works to protect your business’ most important asset: its data. For more information call the IT professionals at 360-491-2227 today.

      Learn More

      Know someone who would benefit from PC Technologies? Let us know!

      Latest Blog Entry

      The increase in wearable technology that you see coming into your business has substantially increased over the past couple of years. People are doing a better job of tracking their health and using wearable technology to improve their work lives. This creates a problem for ...

      Latest News

      5:01 Surge! After Hours Business Block Party July 29th

      Let PC Technologies kick off your 2021 summer with a Business Block Party! Enjoy an evening of networking with the Lacey South Sound Chamber. Attendees can look forward to exclusive raffle items and networking opportunities. This is an after-hours event you won't want to miss!

      Read more ...

      Account Login