Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.

Logo

 
 Popular Services
 (347) 830-7322

Logo

 

Tekie Geek Blog

Tekie Geek has been serving the Staten Island, Brooklyn, Queens, Bronx, New York City, Long Island and New Jersey area since 2012, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Clean Office is a Successful Office

A Clean Office is a Successful Office

Spring is traditionally a time of rebirth and renewal, which has inspired the tradition of spring cleaning - starting fresh and organized after long months of darkness and cold. While the home is the traditional target of spring cleaning, people spend enough time at the office to make some cleaning worth it. In this blog, we’ll go over the benefits of a clean office, as well as how to achieve one.

0 Comments
Continue reading

Tip of the Week: Which Headphones are Right for Your Needs?

Tip of the Week: Which Headphones are Right for Your Needs?

If your office is hectic, a pair of headphones is practically a necessity in order to get anything done. If they are wireless, all the better. When picking your own set of wireless headphones, you’ll want to keep a couple of factors in mind. Here are some of them for your consideration.

0 Comments
Continue reading

How to Identify If an Email is a Security Risk

How to Identify If an Email is a Security Risk

There’s one major reason why email is the preferred method of spreading threats like ransomware and other types of malicious software. The sheer number of messages that can be sent through email on its own increases the odds that a user will click on the wrong link or download the wrong attachment. How can you know the legitimacy of any message you receive in your email inbox?

0 Comments
Continue reading

Making the Switch from Apple to Android? Be Prepared!

Making the Switch from Apple to Android? Be Prepared!

With so many options that don’t cost $800, the Android mobile OS gains more customers every day. If you were a dedicated iPhone user that is looking to switch to Android, you have to be cognizant of the things you will need to ensure that you are able to transfer the information you need, and be able to seamlessly pick up your new device without missing a beat. Here are some issues you should consider:

0 Comments
Continue reading

Tech Term: Virtualization, Defined

Tech Term: Virtualization, Defined

Virtualization is a topic that a lot of people might hear about frequently, but not necessarily understand. It has a lot of details to keep in mind, but the concepts can be remembered easier by simplifying these details. We’ll take a closer look at some of the finer details of virtualization and what it means for your business’ infrastructure.

0 Comments
Continue reading

The CLOUD Act Explained

The CLOUD Act Explained

Another eleventh-hour spending bill passed through the U.S. Congress and was signed into law on March 23, 2018. This time, however, there was a certain earmark that may work to erode individual privacy protection around the globe. The new law, called the Clarifying Lawful Overseas Use of Data (or CLOUD) Act, amends the Stored Communications Act of 1986 and gives unelected American officials extensive powers over global digital privacy rights.

0 Comments
Continue reading

Troubleshooting a Patchy Internet Connection

Troubleshooting a Patchy Internet Connection

Most businesses utilize the Internet in some fashion, and a slow connection can be a major annoyance and inconvenience. Thankfully, there are several ways that you can improve or troubleshoot your connection in the event that it’s suffering. Here are some of the ways you can make sure your Internet connection remains as consistent as possible.

0 Comments
Continue reading

Tip of the Week: 3 Ways to Get Windows 10 to Boot Faster

Tip of the Week: 3 Ways to Get Windows 10 to Boot Faster

Have you ever waited far too long for your Windows workstation to boot up? Chances are that you’ve seen first-hand how much time can be wasted during this process. If you want to save some time, you can review our three tips to help you speed up your Windows 10 computer’s boot time.

0 Comments
Continue reading

More Victims of the Equifax Breach Discovered

More Victims of the Equifax Breach Discovered

The 2017 Equifax leak was a disastrous scenario, but recent revelations have discovered that even more victims were affected than was previously thought. Nobody ever wants to hear this kind of news, but there is an upside to this that shouldn’t be ignored - learning from the mistake. We’ll start with a refresher on what happened exactly, and what these new developments mean for your organization.

0 Comments
Continue reading

Take These Steps to Make IT Security Top of Mind

Take These Steps to Make IT Security Top of Mind

Here’s the thing about IT security: it requires a little more than a decent firewall and a reasonably-strong password. We talk a lot about how to ensure that your business’ network stays a top priority, and the best way to do that is to implement what we call a Unified Threat Management (UTM) solution. An enterprise security system like a UTM can provide a considerable improvement for the way you protect your organization, but even something as simple as a little bit of user error could bypass these protocols.

0 Comments
Continue reading

World Backup Day Highlights the Importance of Backup Practices

World Backup Day Highlights the Importance of Backup Practices

March 31, 2018 is World Backup Day. Data is a commodity, but unlike other commodities--it can be replicated without hurting its value. As a result, data backup has become a critical need for the modern business. World Backup Day has been created to remind people to protect their assets by backing up their files.

0 Comments
Continue reading

Tip of the Week: Moving Your Apps to Your New Phone

Tip of the Week: Moving Your Apps to Your New Phone

While it feels great to power on a new phone and marvel at its slick new interface and features, you might feel frustrated by the fact that you now have to reinstall all of the applications and data that was on your original device. This week’s tip is dedicated to helping you make this process easier and more efficient for an Android smartphone.

0 Comments
Continue reading

Why CPA Firms are in Danger of Being Hacked

Why CPA Firms are in Danger of Being Hacked

The Internal Revenue Service has declared to tax professionals that they must take extra steps toward protecting the information of taxpayers. Certified Public Accountant (CPA) firms, whether they are large organizations or small businesses, hold much information that could be used by hackers and identity thieves, which makes them major targets during tax season.

0 Comments
Continue reading

Data Loss Can (and Will!) Affect Your Entire Business

Data Loss Can (and Will!) Affect Your Entire Business

Data loss, on any scale, is an organizational nightmare. Not only do you have to restore data, any lost productivity that comes as a result of the data loss incident makes it difficult on the budget. That’s only scratching of the surface of how serious data loss can be.

0 Comments
Continue reading

Tech Term: What is a Dongle?

Tech Term: What is a Dongle?

There are countless examples of words that have evolved to meet the needs of their times. Meat once referred to solid food of any kind before it came to mean the edible flesh of animals. The word nice once had many meanings that completely contradicted each other. Today’s Tech Term, dongle, is another word that has evolved, albeit at a faster pace.

0 Comments
Continue reading

Have You Considered What You’re Really Losing When You Lose Your Phone?

Have You Considered What You’re Really Losing When You Lose Your Phone?

Losing a smartphone can be a problem for anyone. For the modern business, it can really cause issues. Mobile devices are notorious for housing a lot of personal information, which makes them extraordinarily dangerous to lose track of. How much is at stake with mobile devices going missing; and, what kind of information is stored on these devices that makes them so dangerous to misplace?

0 Comments
Continue reading

Encrypt and Protect Your Data with a VPN

Encrypt and Protect Your Data with a VPN

If you’ve ever felt as though someone was watching what you were doing while you were working remotely, either at home or in public, there’s a chance that you were right. Without a private Internet connection, it is a simple matter for others to watch your processes and steal the data you’re generating. Is there any way to protect your data as you work outside of the office?

0 Comments
Continue reading

Tech Term: HTML vs Plain Text

Tech Term: HTML vs Plain Text

As a business owner, we’re sure that you’ve spent some time around computers. You might have even seen the phrases “plain text” and “HTML,” used in regards to email. By understanding what both of these phrases mean, you can improve the way that you understand the technology that your business depends on. The primary difference between the two is simply how much information each of them carries.

0 Comments
Continue reading

Email Malware is the New Schrӧdinger’s Cat

Email Malware is the New Schrӧdinger’s Cat

There is a famous thought experiment devised by physicist Erwin Schrӧdinger, describing a very particular paradox in quantum physics through the experience of a cat. While Schrӧdinger’s cat was initially intended to demonstrate a very different phenomenon, it can also be applied to something that all businesses need to consider: their email security.

0 Comments
Continue reading

Disasters Come in All Sizes

Disasters Come in All Sizes

Each organization has a different definition for how they define a disaster. One business might feel that they can get away with losing a few files here and there, while another might need every file to be secure and protected against data loss. Regardless, the importance of being able to define the severity of a disaster cannot be underestimated, as you will need to properly gauge just how much hot water your business has landed in before it can pull itself up by the bootstraps and push forward.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Lithium-ion battery Hacking Gadgets VPN Motion Sickness Supercomputer Managed IT Services Scam Password Laptops IT services New York City Business Computing Document Management Access Managed Service Provider Identity Theft it support Start Menu CCTV Digital Payment Law Enforcement Telephone Systems SaaS Politics Mouse IT Support Office Tips News Wireless Multi-factor Authentication Computers Botnet Hiring/Firing Smartphone Cybersecurity Domains Uninterrupted Power Supply Emails Tracking Startup Business Spyware The Internet of Things Office Browser IT support Staten Island ransomware attacks Automobile Unified Communications Communication Customer Service Data Protection Social Paperless Office Windows 10 Deep Learning Networking Computer Budget Tip of the Week Website Solid State Drive Chromebook Saving Money Proactive IT IT Management staten island managed services Rental Service Outsourced IT Computing Infrastructure Visible Light Communication Data storage Tech Terms 3D Printing Society Cabling Staten Island tech support Webcam Access Control Google Drive Remote Computing Recovery computer support Staten Island Network Security Apple Quick Tips Sports Telephony Money Malware Business Metrics Vendor Management Cleaning Displays computer repair Gmail Taxes Memory Software as a Service Laptop Staten Island computer support Computer Care Private Cloud tech support Bring Your Own Device computer support firms data recovery Staten Island Disaster Wireless Headphones Phishing Device security Congratulations Bitcoin Music CrashOverride Relocation Wireless Technology Software Flexibility Securty Unified Threat Management Maintenance malware Hard disk Email Big Data Patch Management VoIP Artificial Intelligence Virtual Reality Hosted Solutions Information Technology Hard Drive Disposal Compliance IT services NYC IT consulting NYC Passwords Wi-Fi Data Breach Technology Cryptocurrency Devices Staffing Mobile Technology Mobility Fake News tech support Staten Isalnd Digital Hackers today ’s organizations Word Best Practices data loss Vulnerabilities In Internet of Things Productivity Twitter Download Accidental deletion Virtual Desktop Emergency communications computer support Google Calendar Best Practice managed IT services staten island end-user files IT support New York City Privacy Mobile Device Android Cloud PDF DDoS Employer-Employee Relationship Hardware Solutions How To Backup Virus Security Miscellaneous Business Technology Blockchain Business Continuity IT consulting Managed IT Virtualization Cloud Computing Save Money Travel Tablet File Sharing Experience Robot Printing Writing End of Support Tablets Social Media Monitors Desktop Smartphones Tip of the week computer repair Staten Island Office 365 Hack Reliable Computing Mobile Security IT support firms Streaming Media Data Management Public Cloud Remote Monitoring Disaster Recovery Update Bluetooth Scalability IBM Encryption Internet Applications HTML App Vendor Mangement IT support Staten Islans Television Search Downtime Safety Unified Threat Management History Freedom of Information Employer Employee Relationship IT consulting Staten Island Bandwidth VoIP malware worms Computing Two-factor Authentication Holiday Google Maps Content Filtering Virtual Assistant Notifications Specifications IT consulting Staten island User Tips Business Management Antivirus YouTube Legislation Advertising IT Consultant computer services Facebook IT support Worker Comparison BYOD Settings computer services Staten Island Google Wallet Health Text Messaging Innovation IT services Staten Island G Suite Legal Hacker Black Market Microsoft Windows 10 Google Downloads Cloud computing Staten Island Workplace Tips Processors Microsoft Excel Time Management Lenovo Upgrade Mobile Devices BDR IT consulting company Network Managed IT Services Internet of Things Powerful Technology Solutions Business Growth Training Server Documents Excel Work/Life Balance Firewall Windows 8 Company Culture Workstations Data Security Windows Business Mangement managed IT services NYC Administration Data Backup Printer Staten Island IT consulting Retail computer support NYC Vulnerability IT Services Network Congestion Language IT consulting firms Accountants Physical Security WiFi Business Cards Automation Operating System Help Desk Staten Island IT support Machine Learning datto Redundancy Hard Drive Windows XP Workers Distributed Denial of Service Hacks Cortana Cost Management Productivity Regulations LiFi Piracy tech support Staten Island CryptoLocker Knowledge Hardware Spam Microchip Augmented Reality Nanotechnology Audit Outlook Drones Microsoft Office Tech Support Websites email scam Education Alert Small Business Banking Google Docs Samsung Analytics Thank You Project Management Web Server eWaste Computer Malfunction Flash Software License managed services Administrator Efficiency Touchscreen Corporate Profile Collaboration managed services Staten Island Apps managed it services Equifax Cache IT support NYC Ransomware IT consulting firm Data Cybercrime SharePoint Social Engineering Meetings Government Tech Term Running Cable data recovery Hosted Solution Mobile Device Management

Newsletter Sign Up