Get Started Today!  360-491-2227

croom new

PC Technologies Blog

PC Technologies has been serving the Lacey area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Google My Business App Changing to Google Business Profile

Google My Business App Changing to Google Business Profile

The Google My Business application has assisted business owners in managing their online presence for some time now, having gone through numerous name changes in its time. However, Google has one final change planned for its application. 

0 Comments
Continue reading

Tech is a Big Seller on Black Friday and Cyber Monday

Tech is a Big Seller on Black Friday and Cyber Monday

With the holidays fast approaching, people are ready to go out and find the best, most perfect gifts for their loved ones. That said, people don’t want to spend their money frivolously; they want to find the best deals while they are available. We’ve compiled a list of some of the best Black Friday and Cyber Monday deals that have been announced so far.

0 Comments
Continue reading

What We Can Learn from the Facebook Outage

What We Can Learn from the Facebook Outage

We’re all aware of the outage that Facebook experienced a few weeks before it announced its Meta rebrand, which prevented users around the world from accessing the services that the social media giant provides. While it may not sound like a huge deal that people couldn’t share their thoughts with one another for a short time, the ramifications stretched far beyond the inability to scroll through a Newsfeed.

0 Comments
Continue reading

Managed IT Services Cut Down on Computer Repair Costs

Managed IT Services Cut Down on Computer Repair Costs

When you browse the articles available on our blog, you might see the words “managed services” a lot. That’s because we firmly believe that managed services are the solution to a lot of problems that small and medium-sized businesses have with technology management, maintenance, and acquisition. How can managed services help your business push past its limits and establish itself as a powerhouse in the local market? Let’s take a look.

0 Comments
Continue reading

Tip of the Week: Find Your Printer’s IP Address

Tip of the Week: Find Your Printer’s IP Address

Having a network-connected printer is pretty great, but there might come a time when you must know what the IP address is. Let’s go over how you can find your printer’s IP address in the settings for Windows 10 and why you might need to know this information.

0 Comments
Continue reading

Network Monitoring Goes a Long Way Towards Protecting Your Network

Network Monitoring Goes a Long Way Towards Protecting Your Network

Network security is remarkably important for businesses, whether they are small organizations or large enterprises, regardless of industry or number of clients served. Your company needs to take it seriously, which means that you need to actively monitor your network for signs of intrusion. Let’s take a look at what goes into network monitoring.

0 Comments
Continue reading

Have You Bitten Off More Software Than You Can Chew?

Have You Bitten Off More Software Than You Can Chew?

While we certainly have a lot to say about the benefits of the right IT solutions, even we can acknowledge that there is a point of diminishing returns. So, how much technology is too much technology, specifically in terms of the software your team relies on? Let’s explore some of the warning signs.

0 Comments
Continue reading

Tip of the Week: Cleaning Your Headphones

Tip of the Week: Cleaning Your Headphones

A lot of people spend the modern workday with headphones on or earbuds in, listening to music as they work or communicating through a headset. That makes it inevitable that these devices will get dirty. Let’s go over how these devices can be safely cleaned to get rid of the grime that nobody wants to be wearing on their head.

0 Comments
Continue reading

The Most Popular Subject Lines for Phishing Threats are Revealing

The Most Popular Subject Lines for Phishing Threats are Revealing

Even the most cautious employee could fall victim to a well-placed and well-timed phishing email. What are some factors that contribute to the success of these attacks, and what subject lines in particular should people be cautious about? A recent study takes a look at what goes into a successful phishing attack, and you might be surprised by the results.

0 Comments
Continue reading

Is Your View of Your Business’ IT Realistic?

Is Your View of Your Business’ IT Realistic?

When you invest in a new technology solution, you might be wearing your rose-tinted glasses and expecting too much from the solution right out of the box. We all have expectations for what we want the solution to accomplish, but sometimes these expectations simply are not realistic. Let’s take a look at some common misconceptions people have about technology in the workplace, especially in regards to implementation.

0 Comments
Continue reading

Tip of the Week: How to Minimize Employee Burnout

Tip of the Week: How to Minimize Employee Burnout

Workplace burnout is a serious issue that can have far-reaching impacts in your business. Therefore, it is critical that you can identify when one of your team members is starting to feel it, and know what you can do to help reduce it. Let’s go over what can lead to burnout, as well as a few ways to remediate it.

0 Comments
Continue reading

Malware That Targets Android Can Cause Major Problems

Malware That Targets Android Can Cause Major Problems

You often hear about malware that infects desktop PCs, laptops, or servers, but other types of malware that infect mobile devices also exist. One such malware, a threat called TangleBot, has been discovered, and it can become seriously problematic for both workers and consumers utilizing Android devices—especially in today’s mobile-centric workplace.

0 Comments
Continue reading

Is Your Business’ Antiquated Technology Holding You Back?

Is Your Business’ Antiquated Technology Holding You Back?

When was the last time that you took a hard look at your business’ technology? How old are some of the devices that you rely on each day? These are critical questions to answer if you want your business to succeed. Let’s discuss why upgrading is so important, and how to determine when the time to upgrade comes.

0 Comments
Continue reading

How Centralized Authority is Crucial for Your IT

How Centralized Authority is Crucial for Your IT

The cloud is undeniably an invaluable business tool, so long as you maintain control over your business’ usage of it. This centralized authority over your cloud’s access controls is key to its successful utilization. Let’s briefly discuss what this means, and the ways that this can be established.

0 Comments
Continue reading

Cybersecurity Helps Keep Your Law Firm’s Data from Being Distributed Pro Bono

Cybersecurity Helps Keep Your Law Firm’s Data from Being Distributed Pro Bono

It can be too easy to overlook the importance of technology and its security, particularly in industries that are deeply steeped in tradition, regardless of how crucial that security may seem when actually considered. Just consider the modern law firm, where technology, data, and the security of such is paramount.

0 Comments
Continue reading

A Hard Look at a Four-Day Workweek

A Hard Look at a Four-Day Workweek

When you think about the workweek, there’s a good chance that some iteration of the 40-hour week, broken into 9-to-5 shifts on the weekdays is what comes to mind. It’s just the way things are done. However, this may not be a good thing. Let’s consider the origins of our modern work schedule, and how changing it could provide us all with some serious benefits.

0 Comments
Continue reading

Tip of the Week: Examining NIST’s Definition of Zero Trust

Tip of the Week: Examining NIST’s Definition of Zero Trust

Let me ask you something: how many people do you fundamentally trust? Well, in a zero trust network, that number is reduced to zero. The idea of such a network is that everyone, whether they’re operating inside of the network or out, needs to be verified… and as you might imagine, it has proven effective in preventing data breaches. 

0 Comments
Continue reading

Is Your Web Browser Secure?

Is Your Web Browser Secure?

The Internet browser is easily one of the most-used applications in this day of cloud-hosted resources and online content… but for all that use, is it also one of the most-secured applications? In some ways, yes… but there’s always a few extra steps that can help you improve your protections.

0 Comments
Continue reading

Could Voice Authentication Join the Ranks of MFA?

Could Voice Authentication Join the Ranks of MFA?

Authentication has been a major talking point for the past few years, particularly as the value of data has only increased and security has correspondingly increased in importance. As a result, more secure and reliable means of identity verification have also become more critical. Now, voice authentication is being considered as such a means.

0 Comments
Continue reading

Is the VPN My Office Uses a Public VPN?

Is the VPN My Office Uses a Public VPN?

Virtual private networking, while maybe not the most familiar term to everyone, at least seems to be pretty straightforward. Such a specific-sounding term must apply to one aspect of technology and that one aspect alone, right?

Well, kind of, sort of, not really. In actuality, there are two kinds of VPN. Let’s go over what makes them different, and which your business should utilize.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Latest Blog Entry

The Google My Business application has assisted business owners in managing their online presence for some time now, having gone through numerous name changes in its time. However, Google has one final change planned for its application. 

Latest News

5:01 Surge! After Hours Business Block Party July 29th

Let PC Technologies kick off your 2021 summer with a Business Block Party! Enjoy an evening of networking with the Lacey South Sound Chamber. Attendees can look forward to exclusive raffle items and networking opportunities. This is an after-hours event you won't want to miss!

Read more ...

Account Login