The Thurston, Pierce, Lewis, and Mason Counties IT Experts


We work hard behind the scenes so annoying technology issues don't slow your business down.

Our mission is to help businesses like yours increase productivity and get more out of the technology you invest in.
We specialize in solutions that safeguard and protect your data and keep operations running smoothly.

Managed IT Services

Intelligent remote monitoring, proactive maintenance, and behind-the-scenes remote support.

read more

 

Network Security

Protect your business from threats like malware, viruses, phishing attacks, hackers and other threads.

read more

Backup & Disaster Recovery

Ensure peace-of-mind in any situation with the most complete data backup solution available.

read more

Cloud Hosting Solutions

Reduce infrastructure costs, collaborate, and get more done with our unique cloud solutions.

read more

mobility managementMobilize your business today.

At PC Technologies, we understand that, in some way, mobility is a major pain point of your business. However, enterprise mobility is a comprehensive subject that must address more than just the management of applications on your devices. A Enterprise Mobility Management solution is geared toward helping your organization better understand, manage, and secure your mobile systems. We’ll work with you to ensure that your enterprise mobility management solution keeps your devices in check.

Mobile Device Productivity Solutions

Improve operations with mobile devices.

Bring Your Own Device (BYOD) is an increasingly popular trend, and one that can be leveraged to your organization’s advantage. If your team is bringing mobile devices into the workplace, you’ll need solutions that work with them. PC Technologies can equip your business with applications and other solutions that are designed to maximize productivity on any mobile device. Our solution is scalable and customized to fit your business’s specific needs.

Secure Device Management

Keep your operating systems and software solutions in check.

Your business’s systems need to be secure, and there’s no better way to keep them that way than with our EMM solution. We can provide end-to-end security management for all of your network’s operating systems, software solutions, mobile devices, and so much more. What we provide is one solution that’s designed to unilaterally manage and maintain your device security. Whether you want to secure your company’s email on mobile devices, or manage applications on your in-house desktops, we have a solution for you.

Mobile Device Management

Remotely manage and maintain devices and business apps.

It’s every business owner’s worst nightmare; an important device is lost or misplaced. Mobile device management solutions allow your organization to keep tabs on all of your devices, including resource allocation, application activity, whitelisting and blacklisting apps, and most important of all, remote wiping. You have complete control over your organization’s mobile devices, all remotely.

Get Started Today

Don’t let mobility be a pain point any longer.

It’s not always easy to implement new technology solutions, but with PC Technologies, it can be. We’ll handle the setup and management of your enterprise mobility technology, so that you can instead focus on running your business. To learn more, reach out to us at 360-491-2227.




Who Are We?

It's Nice To Know Who You're Working With, We Get That

PC Technologies understands that making a decision means putting your trust in us. We encourage you to find out more about our company and read testimonials from our many satisfied customers!

About PC Technologies

We are not your typical business, We are your business partners

We live by the idea that your business needs come first, so much so that our CEO W. Jeff Seeman has written a letter for you to read showing just how dedicated our team is to not only solving problems but your success!

Read More
Our Difference
 
It's a Secret

Shhh, don't tell anyone we told you!

WARNING: We are about to let you in on a secret about how most computer companies really make their money! We will cover the three main types of IT companies and what you can expect out of them.

Discover What It Is!
 

Refer A Friend To PC Technologies!

Do you know someone who you think my benefit from our services? Let us know and we will get in touch with them!

Read More
Refer a Friend
 

What Our Clients Say

  • I highly recommend PC Technologies for any of your IT and/or computer needs
    Practice Manager at Robert GR Lang, MD Inc

    Jeff has provided computer components and IT services to our medical practice since 2007. He has seen us through a system conversion, office move, and EMR implementation, providing the peripherals and support needed to make a smooth transition each time. He and his staff are prompt, professional, and price conscious. I highly recommend PC Technologies for any of your IT and/or computer needs

  • Gets it fixed fast
    CPA

    Jeff and his staff installed a major computer upgrade for my office. There was no down time for my staff, the system works great and whenever there's glitch, Jeff, or one of his staff, gets it fixed fast.

  • No more having to take the computer into the store
    Director at Washington Gemological Laboratory

    I have relied on Jeff and his crew for not only minor 'bugs' that occur but also for swapping out the entire data from an older laptop into the one I currently use. They have always been able to do the job and quickly. Most of the time they are able to resolve the issue over the phone, while controlling my computer from their office. Love it!! Makes my life so much easier. No more having to take the computer into the store.

  • Jeff is the IT consultant for our company.
    Citizen Action Network at Freedom Foundation

    He goes the extra mile to ensure that all of our computer infrastructure is running smoothly. When we do encounter problems Jeff is quick to respond. He has become integral to our team--so much so, we should call him a staff member rather than a consultant.

  • PC Tech is a great place to get all of your IT needs.
    Branch Manager / Loan Officer at Weststar Pacific Mortgage

    Jeff is always available and works with you on the best possible solutions to ones needs. I would recommend PC Tech to anyone that is running a business and does not want to deal with IT.

  • Jeff is able to bridge the gap between IT professional and customer relationships very well.
    Board Member at Seattle Search Network

    I've recommended him to clients that are in need of IT services many times. Jeff is highly skilled in IT and understands the changing trends and its impact to the small business owner. I'd highly recommend Jeff to others seeking for an IT professional.

Latest Blogs

Take Control Over Your Facebook Security Settings and 2FA

First, let’s log in to Facebook on a computer to manage the bulk of the security settings.

Making Sense of Facebook’s Security and Privacy Options

Log in to Facebook.com and click the little down arrow on the top right. Then click Settings. If you ever get lost during this guide, you can get back to where you need to be by coming back to this point.

We’re going to spend quite a bit of time here. Let’s start with a little general housekeeping.

Verify the General Account Settings are Correct

Make sure you own and control all of the email accounts tied to your Facebook account. This is just good practice for all of your online accounts - every ecommerce site, every social network, every service you sign up for - if any account is tied to an older email address that you don’t check anymore or don’t have access to, you’ll have a hard time getting back into the account if something were to happen. 

Security and Login - Find Out Where You’ve Logged into Facebook

Click Security and Login on the right.

First, Facebook will show you all of the recent devices logged into your account. It will show you approximately where geographically the device was, the browser used, and when it was last active. Obviously, if you see something suspicious here, you should change your password right away (the options for that are directly below). Additionally, you can click the 3-dot icon on the right next to any login and log that device out.

If It’s Been a While, Take a Moment to Change Your Password

While we’re here, it wouldn’t hurt to create a new Facebook password. You should consider doing this across all of your accounts regularly (at least every 6-to-12 months, but more often for critical accounts like your bank and email).

Just as a reminder, you can get there by clicking on the down arrow on the top right of Facebook, going to Settings, and clicking Security and Login.

Make sure to never use the same password for two different accounts online.

Enable Two-Factor Authentication

Directly below the password options are settings for two-factor authentication (2fa). This adds additional security to your account in case your password gets stolen. Select Use two-factor authentication and click edit. Facebook will take you to a page that walks you through setting it up. From there, click Get Started.

You will be given two Security Methods. We recommend understanding both options before choosing one:

Option 1 - Authentication App - This lets you use a third-party authentication app like Google Authenticator or Duo Mobile to generate the login code. This is a little bit more secure, but it does require you to have access to the mobile device that the authenticator app is installed on. 

To set this up, open the Google Authenticator or Duo Authenticator or LastPass Authenticator on your mobile device. It makes the most sense to use the authenticator app that you use for other accounts, but if you don’t have one, and you have a Google account, use Google Authenticator. 

Then, from Facebook on your computer (see the above screenshot), select Authentication App and click Next.

Facebook will give you a square barcode called a QR code to scan. In your Authenticator App, add a new account (typically there is a + icon to tap) and scan the QR code. Once scanned, the app will generate a 6-digit number to use. Facebook will ask for a Confirmation Code. Type in the 6-digit number and you’ll be set.

Option 2 - Text Message - Facebook will send a code to your phone number. You’ll want to make sure your phone number is accurate and can receive texts. This isn’t as secure as using an authentication app, because it is technically possible for a hacker to intercept your text messages, but it’s definitely better than nothing.

Setting this up is simple, once you choose Text Message and click Next, Facebook will text you a code. Type that code into Facebook and you’ll be set.

Depending on the option you choose, Facebook will walk you through the next steps to verify and enable two-factor.

Add a Backup
Once two-factor authentication is set up, Facebook will give you an option to Add a Backup. If you choose to set up two-factor with an Authentication App then Facebook will allow you to set Text Message 2FA as a backup, and vice versa. It’s not a bad idea to set up the other method as well, just in case.

Lots of online accounts offer 2FA, and some of them (like Google, Microsoft, and Amazon) will give you backup options as a way of giving you an alternative way in in case your primary method of 2FA isn’t available. Let’s say you were using text messages for your 2FA and you get forced into a situation to change your cell phone number. You’d be in a difficult situation if you didn’t have a backup option.

Facebook also lets you grab Recovery Codes (by the way, Google does this too, so if you have a Google account or use Gmail, it’s a good idea to get all of this set up over there as well).

Back on the Two-Factor Settings page, under Add a Backup, there is an option for Recovery Codes.

Click Setup, and Facebook will pop up a window telling you about recovery codes, and click Get Codes.

Facebook will give you 10 recovery codes that you can use in an emergency to get back into your account. These codes basically work as one-off 2FA codes, so you’ll need to know your Facebook password and one of these 10 codes to get back into your account.

Remember, these recovery codes can only be used once. You can request 10 new codes at any time by going back to the Two-Factor Settings page, but you can’t use the same code twice. It’s also very important that you keep them in a safe place, but not make it clear to anybody what they are. Write them down on an index card with a big “F” written in the corner and keep it in your wallet.

Setting Up Extra Security

Back in the Security and Login area of Facebook’s Settings, scroll down to Setting Up Extra Security.

This area allows you to get alerts sent to you when a new device or browser is used to log into Facebook. It’s pretty straight forward, you can even define additional email addresses if you want. You can also have those notifications sent to you via Facebook Messenger, SMS, or as a Facebook notification. We definitely recommend at least having it set up to email you.

Below that option, you can choose 3 to 5 Friends to Contact if you get locked out. If you set this option up, make sure you only put in people you can trust. Also, it might be a good idea to only add a contact who you feel takes their security seriously. Otherwise, turn off this option.

We realize this has been a lot, but by setting up 2FA and controlling who and what device has access to your Facebook account, you are taking a big step in controlling your online identity. We encourage you to take time to review all of your social media, bank accounts, online shopping accounts, email accounts, and other services you are signed up with to prevent unauthorized access. 

Our next Facebook article will be about protecting your privacy, so be sure to follow our blog for more tips and best practices for protecting both your personal identity and your business!

Learn More

How To Get Control Over Your Facebook

Grab Everything that Facebook Knows About You

First and foremost, you should download everything you’ve ever told Facebook about you. 

Of course, Facebook might know more about you than you’ve told it, and we’ll be grabbing all of that information too. After 2018’s Cambridge Analytica scandal, where it was exposed that a third-party Facebook app developer was selling the personal data of Facebook users, the social network vowed to be more transparent about the data they collect. We’re all for that.

Facebook has even made it pretty easy to do so. We’ll provide the steps if you are on a computer first, and after that we’ll walk you through how to do it from the mobile app.

On a desktop or laptop:

  1. Log in to your Facebook account.
  2. If you are on a desktop or laptop, click the down arrow on the top right and go to Settings.
  3. On the left, click Your Facebook Information.
  4. Facebook will present you with five options. Look for Download Your Information.
  5. Click View, Facebook will give you a screen where you can choose the date range and format of the data. Since in this case, we want to download everything, we’re going to set the Date Range to All of my data and set Media Quality to High. This means we’ll get a higher quality version of all of our photos and videos in the download.
  6. Click Create File and Facebook will start building the download. This can take a while, but Facebook will give you a notification when your data is ready for download.
  7. Once Facebook gives you the notification, click it and Download your data.

From the Facebook mobile app:

  1. Tap the 3-bar hamburger icon in the top right of the app.
  2. Scroll down and tap Settings & Privacy, and then tap Settings.
  3. Tap Download Your Information.
  4. Leave all of the options checked, and scroll down. Ensure the Date Range is set to All of my data and that Media Quality is set to High.
  5. Tap Create File and Facebook will give you a notification when the data is ready for download.

In my experience, it took Facebook about an hour before I received the notification. Also, keep in mind, depending on how active you are on Facebook, this file can get pretty big. For some it could be a few hundred MB, and in other cases it could be several GB of data.

While we wait, let’s talk about the other options on the Your Facebook Information page on the desktop:

Access Your Information - This lets you view virtually everything Facebook knows about you from within Facebook. It breaks down all of the data into several categories, such as Posts, Photos, and Location. Essentially these options just send you around Facebook to show you your information. This is nice, but our goal here is to own a copy of all of our Facebook data outside of Facebook.

Activity Log - This redirects you to all of your Facebook posts and your Timeline Review. This is a nice way to review your old posts over the years, but this area only scratches the surface of what Facebook really knows about you.

Managing Your Data - This area is essentially a glorified FAQ for managing your data. The page will ask if you want help with Facebook or Instagram, and then feed you a few predefined questions to choose from, and attempt to send you to the right area on Facebook to adjust the settings. It’s kind of a round-about way to manage your permission settings or report an issue.

Deactivation and Deletion - Like the name suggests, this area lets you either deactivate your account temporarily, or permanently delete your Facebook account.

What Does Facebook Know About You?

Once you’ve downloaded the file, you can dig through things to really get a feel for how much Facebook knows about you. There are the obvious things, like your posts and photos.

Then things get pretty… interesting.

For example, Facebook can track your location history. I was able to pull up a day two weeks ago and see exactly when I left my house to come to the office, when I left the office for lunch, and when I went downtown to run errands after work. In some cases, it knew exactly where I went (right down to the name of the store) but in most cases, it said “Place in Olympia.”

Under Ads, you can see a list of advertisers who have uploaded a contact list with your information. In other words, these advertisers previously had your information already and then possibly ran ads targeting you. It’s actually pretty unnerving… or fun, depending on your view on life and privacy. Let’s be honest, it’s mostly unnerving.

Wait! Before You Jump Ship and Quit Facebook Forever…

Yes, Facebook knows a lot of information about us. Yes, Facebook has been irresponsible with what they know and the power they have. With that said, with a quarter of the world population active on the social network, we’re all in this boat together. There are a lot of positives to Facebook too, and as long as you are careful with the information you feed it (and understand where Facebook gets all of its other information about you), you can still take advantage of all of the positive aspects of Facebook without feeling like Mark Zuckerberg is watching you sleep.

Remember, Facebook is still a great platform for:

  1. Reconnecting with friends and family
  2. Following businesses and organizations you like
  3. Joining groups and sharing interests with new people
  4. Marketing your business and keeping in touch with customers

We’re going to review all of Facebook’s current privacy settings in a future blog, and walk you through how to protect your identity without feeling like you need to change your name and move to a cabin in the mountains.

Did you review your downloaded Facebook data? Did you learn something about yourself that you didn’t know before? If you find anything juicy that you’d like to share with us in the comments, please do! Otherwise, stay tuned for our next post!

Learn More

Tip of the Week: Four Policies to Keep Your Business More Secure

Browsing Safely

Many of the threats that will target your business’ data ultimately rely on a user to allow them access to a network. Therefore, it is important that all of your business’ users are familiar with the following concepts, and abide by them.

  • Check URLs before accessing them. Cybercriminals will often disguise malicious links and malware downloads as something that the average user wouldn’t think twice to click on. For example: www.google.com - you’d assume this URL would direct you to the search engine, right? However, simply by directing it somewhere else, an attacker can easily catch your business unawares. Make sure you check the link by hovering over it, so that you can see the URL it actually directs to in the bottom of your browser window.
  • Business computers should be used for business. Websites of all kinds are prone to hosting threats that can then infiltrate your systems when you visit them or download content. Encourage your users to stick to work-related tasks while using workplace devices.
  • Restrict access to (and from) your systems. On a related note, there are tools that allow you to protect your assets from these threats, and can even prevent your users from accessing potentially threatening websites themselves. Firewalls and content filtering are both critically important for a business to enact.
  • Rely on IT professionals. Never hesitate to call in an IT resource if you need assistance, even for the most seemingly simple issues.

Preserving Data

Your data is critical to your success, which means it needs to be secured. This includes not only the data that you have on your clients, but on your employees as well. To do so, it will help to follow a few practices.

  • Keep a data backup. When there are so many possible ways to lose your crucial business data, you need to be sure you have an ace up your sleeve. A cloud-based backup is the recommended means of doing so.
  • Leverage access control. It isn’t enough to simply secure your files digitally. You also need to make sure your location is secured, inside and out. Using access control solutions and various identity verification measures to protect certain areas of your business are key.
  • Keep your security up to date. Threats to your business are always in development, which means you always need to be improving the defenses that protect it. New vulnerabilities are discovered (and resolved) all the time, so you should always be monitoring your solutions for available updates.
  • Make sure you abide by regulations. There are many regulations that dictate how your business should conduct itself and its operations, like the Payment Card Industry Data Security Standard (PCI DSS).

Phishing Prevention

Phishing is rising in popularity, which makes it all the more important that you and your staff know how to spot it and avoid it. Here are some ways to avoid it:

  • Avoid excessively urgent messages. In order to push their targets into action, many phishing messages will try to inject urgency. The idea is, if the target is alarmed enough, they won’t look more critically and identify the scam for what it is.
  • Check for key details. There are a lot of warning signs that a message could be a phishing attempt. Potentially, these could be spelling errors in what should be a professional message, or the hover-check that we discussed above. Keep an eye out for these warning signs, and read some of our other blogs to learn other signals to check for.
  • Confirm the message. If you have the opportunity to confirm that someone sent what looks like a phishing message through another means of communication - do so. If they did, you’re fine, and if they didn’t, you know to delete it.
  • Be judgmental. If you really can’t tell if a message is legitimate, assume it isn’t, and report it to your IT provider.

Password Practices

Passwords are pretty much ubiquitous nowadays, which only makes it more important that your workplace establishes standards to using them.

  • Passwords shouldn’t be recycled. One of the common things that are available on the Dark Web to cybercriminals are lists of stolen credentials. If you had an account on one of the websites that are hacked to get these lists, and you reuse your passwords, you could very well find your other accounts also compromised.
  • Keep your passwords complex. In their attempt to create a password that they’ll remember, many users will make passwords based on common themes: things like pet names, birthdays, and other common details. This makes it easy for someone to deduce your passwords, especially with the help of social engineering.
  • Try passphrases. Passphrases are especially beneficial, as they are more memorable than the typical passwords that best practices would have you create using a jumble of random alphanumerics. Furthermore, they have been shown to often be more effective than passwords where security is concerned.
  • Use password managers. Forgetting passwords is one of a modern user’s biggest concerns, which contributes greatly to their tendency to lean on insecure practices. A good password manager can effectively reduce the number of passwords that you need to remember to one.

These points can lend a great start to your business’ security. PC Technologies can help enact them, and more - reach out to us at 360-491-2227 to learn what else we can do.

Learn More

Know someone who would benefit from PC Technologies? Let us know!

Latest Blog Entry

Whether you love, hate, or are just indifferent about Facebook (no judgement here), it’s worth configuring and locking down your account to control what others can see about you.Facebook is front and center when it comes to privacy-related issues worldwide, so in this blog w...

Latest News

PC Technologies launches new website!

PC Technologies is proud to announce the launch of our new website at www.pctechnologies.net. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

Read more ...

Account Login