Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.

Logo

 
 Popular Services
 (347) 830-7322

Logo

 

Tekie Geek Blog

Tekie Geek has been serving the Staten Island, Brooklyn, Queens, Bronx, New York City, Long Island and New Jersey area since 2012, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Information Technology: How to Handle the Inevitable

Information Technology: How to Handle the Inevitable

Sometimes it might feel like your technology never works as you want it to. You might try to open up a software application only to find an error message that keeps you from being productive. The error doesn’t go away no matter how many times you reload the application. How can you eliminate these issues that threaten to derail your productivity throughout the workday?

0 Comments
Continue reading

Antivirus, Analyzed

Antivirus, Analyzed

Antivirus is a crucial component to any network security platform, but do you know how it works? Below, we’ll go over how your security is improved by an antivirus solution.

0 Comments
Continue reading

Technology Basics: Print Toner

Technology Basics: Print Toner

By-in-large, most of today’s businesses are doing more to move away from their reliance on printed material. That’s not to say that nearly every business still requires the use of at least one printer. Most people believe that when your “ink” is low in your printer, the quality of the print job will suffer. This is true for inkjet printers, but for those that have laser printers, the “ink” isn’t really ink at all, it is a thing called toner. For this week’s technology basics article we will define what print toner is and how it differs from ink.

Tags:
0 Comments
Continue reading

Data Backup Is a Staple of the Modern Business

Data Backup Is a Staple of the Modern Business

It’s no surprise that businesses will avoid spending money on things they don’t need at all costs. While it might seem harmless to avoid investing in certain technology solutions that just aren’t needed, one that you absolutely cannot go without is data backup and disaster recovery. A business that doesn’t survive disasters can’t succeed, so if you want a future for your business, it’s important to invest now before you can’t later on.

0 Comments
Continue reading

Want Proof that You Need to Monitor Your Solutions?

Want Proof that You Need to Monitor Your Solutions?

When discussing the practice of monitoring solutions to prevent threats, it isn’t uncommon for many businesses to put these concerns on the back burner. However, every so often, an example comes around to help inspire businesses to take their monitoring seriously. This time, the example was the arrest of 24 spammers in October for scamming American citizens by impersonating Microsoft support staff members.

0 Comments
Continue reading

Tip of the Week: Improvement Needed to Avoid Cybercrime

Tip of the Week: Improvement Needed to Avoid Cybercrime

Did you know that almost 90 percent of small business owners feel they are completely safe from attack? It’s unfortunate, but the truth of the matter is that half of these businesses will eventually be proven wrong--they too can suffer from a cyberattack. Are you going to risk becoming one of them? You should know now that there is no reason to.

0 Comments
Continue reading

Blockchain Technology Primed to Transform Healthcare

Blockchain Technology Primed to Transform Healthcare

The healthcare industry is heavily reliant on its IT. Before 2009, there were scant traces of information technology making its way into healthcare organizations in the United States, but in 2009 there was a major shift after the 111th U.S. Congress passed the Health Information Technology for Economic and Clinical Health Act (HITECH Act) as a part of the American Recovery and Reinvestment Act of 2009. Today, IT in the health industries is prevalent, and mostly expected.

0 Comments
Continue reading

The Internet Brings More to Every Business

The Internet Brings More to Every Business

The Internet is incredibly important to the success of not only businesses, but countless users all over the world. In terms of the actual strength of the Internet though, people might not know just how many options there are out there that can provide access to this dynamic and feature-filled network. Thanks to the Internet, businesses all over the world have access to plenty of great services that enable them to accomplish as much as possible.

0 Comments
Continue reading

Tip of the Week: Evernote Templates Present Powerful Options

Tip of the Week: Evernote Templates Present Powerful Options

The most productive people are the ones that have the information they need on hand. If you are one of the millions of people that don’t have access to a team of researchers, it will likely fall on you to do most of the research you need yourself. While you may only sparsely use Evernote, today the powerful note-taking app offers pre-made templates to help you get more organized.

0 Comments
Continue reading

Should You Be Excited or Afraid of Automation?

Should You Be Excited or Afraid of Automation?

Your business has a lot of moving parts, and these parts need to be managed properly if you hope to maintain (or improve) operations. However, even the smallest parts of your organization could directly influence your business’ workflow. If these processes are getting in the way of your employees getting the most out of their workday, perhaps automation can provide a way to save time and resources.

0 Comments
Continue reading

5 Reasons Why an RMM Approach Would Work for You

5 Reasons Why an RMM Approach Would Work for You

Your business, like all businesses, relies on a lot of moving parts to function. That’s the reality. What isn’t the reality is that you have no control over whether these moving parts will break down, and that you have to just sit and wait for it to happen, reacting when it does.

0 Comments
Continue reading

Technology Basics: Navigation Bar

Technology Basics: Navigation Bar

Navigating some websites can be a pain, but thankfully, there is a handy-dandy tool that just about all of them utilize to make it easier for users. We’re talking, of course, about the navigation bar. We’ll discuss what the navigation bar is, what it does, and why it’s so helpful for a website or application’s end user.

0 Comments
Continue reading

The Computer Processor May Not Be What You’d Expect

The Computer Processor May Not Be What You’d Expect

Computers are far from simple machines. They rely on complex bits of technology that only professional technicians have any business maintaining. Some of this technology takes advantage of microchip technology to function as intended, and without them, they wouldn’t be able to function. While the everyday business owner might not need to know much about the specifics, you should at least know a little about how certain chips are used.

0 Comments
Continue reading

Are Your Mobile Security Settings Up to Par?

Are Your Mobile Security Settings Up to Par?

While you may not consider it at first, your mobile device has a sizeable amount of personally identifiable data on it - far more than should be left on an unsecured phone at any time. Fortunately, Google has added a considerable layer of protections to Android to assist users with their security. All a user has to do is know how to use them to their fullest potential.

0 Comments
Continue reading

How to Order the Items on Your To-Do List

How to Order the Items on Your To-Do List

Being in business today means that you have a lot on your plate, it’s as simple as that. Yet, with so many tasks piling up, it can be challenging to prioritize them all so you can figure out where to start. Below, we go over some strategies you can use to make sense out of all the tasks you have on your day and reach a point of productivity.

0 Comments
Continue reading

Is Your Organization Ready for a Disaster

Is Your Organization Ready for a Disaster

While not every business needs to worry about hurricanes, the same can’t be said for other kinds of disasters out there. Tornadoes, fires, and other natural disasters could strike at any moment depending on geographical location, but if you’re prepared, you can limit the influence these events have on your organization’s future.

0 Comments
Continue reading

How You Can Benefit from RMM

How You Can Benefit from RMM

It’s clear that your business’ profession was chosen based on a specific lack or need in your area, but if you don’t have the technology to make sure this need can be met, you’re not providing value to your clients. This is one of the key reasons why businesses like us offer remote monitoring and management services to organizations like yours.

0 Comments
Continue reading

Technology Basics: Bare Metal Restore

Technology Basics: Bare Metal Restore

Sometimes an issue on your computer causes it to be so far gone that drastic action is needed to get it back in gear. This is where the bare metal restore comes in, and it’s something that you only want to do in the event that you encounter a problem that is just too much to bear. We’ll walk you through what this is, what it involves, and why you might have to do it in the future.

0 Comments
Continue reading

Enhancements Made to Google Maps

Enhancements Made to Google Maps

Google Maps is a neat service that helps users navigate during their travels, but more upgrades are being released all the time to augment their experiences. Some of the most recent updates have provided additional functionality that can provide users with even more ways to use Google Maps--particularly in regard to actually making it to their destination on time and in style.

0 Comments
Continue reading

Fileless Malware Attacks Increasing

Fileless Malware Attacks Increasing

Ransomware has been far from low-profile since its inception several years ago. Everyone knows what the file-encrypting malware does, and they all know that paying the ransom can make the nightmare go away by decrypting the files located on their computer. As if the threat of losing data forever wasn’t enough, you’re staring down a ticking clock while this is going on. Nowadays, ransomware is becoming more difficult to manage through various tactics.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

VoIP tech support Business Computing Server Domains Tech Support data loss Computer Care managed services Monitors How To Remote Monitoring Tech Vulnerabilities News Patch Management Hardware Malware VoIP Hardware Solutions The Internet of Things Mobile Security Multi-factor Authentication Cloud computing Staten Island Knowledge Windows XP Microsoft Evernote Innovation Blockchain Device security Web Server Legislation Politics Content Filtering Accidental deletion Access Control Service Level Agreement computer repair Staten Island Employer Employee Relationship Downloads Bring Your Own Device IT support NYC Network Congestion Cache Vendor Management Augmented Reality Worker Chromebook Government IT consulting Data Management Automobile Samsung Software Money Information Technology Staten Island tech support Reliable Computing Business Uninterrupted Power Supply Identity Theft Safety Sports IT support firms Virtual Desktop Experience Congratulations VPN Flash Tip of the week Business Cards Antivirus eWaste Bluetooth WiFi Data Private Cloud Retail Processors Office 365 Data Analysis Telephone System IT support Staten Island Customer Resource management Addiction Tablets Physical Security YouTube Tactics IT consulting company PDF IT consulting Staten Island Relocation Search Rental Service Websites Hack Content Two-factor Authentication Holiday Going Green Time Management Productivity Education Health Microsoft Excel Google Drive managed IT services staten island Flexibility Digital Payment Electronic Medical Records Wireless Best Practice Regulation Quick Tips datto Encryption Social Engineering Excel Gamification Smartphones Virtualization Printing Google Maps Office Tips Tablet computer support NYC Username Monitoring Disaster Proactive IT Motion Sickness Microsoft Office Lenovo Business Metrics Internet of Things Remote Computing Ransomware Startup Software as a Service Vulnerability IT consulting NYC Save Money Gmail Machine Learning Language History Wi-Fi End of Support Directions Android Vendor Mangement Staten Island IT consulting Small Business Windows 10 Touchscreen Security Saving Money Analytics Gadgets Emergency Meetings Displays Computer Malfunction Network Security IT services Staten Island Scalability Mobile Device Management Deep Learning Mouse Tip of the Week it support Start Menu Website Windows 8 Settings Operating System Applications staten island managed services Users Passwords Data storage Taxes IT support Error today ’s organizations Social Network computer support Television Efficiency Unified Threat Management Software License Writing Navigation Managed IT Services end-user files Maintenance Document Management computer support firms ransomware attacks Collaboration Business Technology User Tip Cloud Travel Alert IT Management data recovery computer services Thank You Data Protection Management Bitcoin Equifax Big Data Email Streaming Media Social Unified Threat Management Miscellaneous Emails IT Consultant managed IT services NYC Desktop Paperless Office Running Cable Update Access Memory computer support Staten Island Business Management Data Backup Mobility Hackers Unified Communications Twitter Law Enforcement Password Managed Service Robot Redundancy IT Support Entertainment Vendor App Windows 10 Corporate Profile Networking Artificial Intelligence Banking Employer-Employee Relationship Productivity Laptop Healthcare Conferencing Hiring/Firing tech support Staten Island IT support Staten Islans Downtime Specifications Smartphone Managed IT Help Desk Scam In Internet of Things Supercomputer Company Culture Network BDR Mobile Device Outlook Hosted Solutions Mobile Technology Cortana IT services NYC Solid State Drive CCTV Customer Service Processor Hosted Solution Backup and Disaster Recovery Mobile Devices Fileless Malware Training Business Mangement communications Technology Advertising Cost Management Legal Visible Light Communication Laptops Firewall Computing Infrastructure malware Hard disk Term Cleaning 3D Printing Bookmark Best Practices Lithium-ion battery Printer Apps Google Calendar Cloud Computing Social Media Cybercrime Virtual Assistant Spyware Telephony Windows Staffing Privacy computer repair Audit Apple Accountants Google Docs Cybersecurity DDoS IT support New York City Workplace Tips Microchip Project Management Communication email scam SaaS Tracking Data Security Administrator Hacks Google Wallet Google Business Continuity Drones Word BYOD Workers IT services New York City Music Saving Time Freedom of Information IT Services Piracy Devices Hacking Staten Island IT support Backup CrashOverride malware worms Download Disaster Recovery G Suite computer services Staten Island Computer Public Cloud Trends Hacker Database Office Spam Cryptocurrency Facebook Screen Reader Network Management Regulations Administration Browsers Virtual Reality Botnet Hard Drive Disposal data recovery Staten Island Bandwidth Printers File Sharing Wireless Technology Data Breach Browser Managed IT Services SharePoint Nanotechnology CryptoLocker Staten Island computer support IT consulting firm Digital Multi-Factor Security Compliance Recovery Virus Distributed Denial of Service Health IT Comparison IT consulting Staten island Business Growth Documents Securty Work/Life Balance managed services Staten Island Internet Upload tech support Staten Isalnd Fake News HTML Wireless Headphones IBM Webcam Information Proxy Server Managed Service Provider Computing Powerful Technology Solutions Cabling Tech Terms Outsourced IT Computers Telephone Automation Phishing Budget User Tips Black Market Tech Term Managing Stress managed it services Hard Drive Workstations Text Messaging Upgrade Society IT consulting firms Notifications Telephone Systems LiFi

Newsletter Sign Up