Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.

Logo

 
 Popular Services
 (347) 830-7322

Logo

 

Tekie Geek Blog

Tekie Geek has been serving the Staten Island, Brooklyn, Queens, Bronx, New York City, Long Island and New Jersey area since 2012, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Have You Figured Out Your Next Technology Implementation?

Have You Figured Out Your Next Technology Implementation?

The capabilities of business technology are truly incredible, and they’re only becoming more impressive. This means that the solutions you have in place now will certainly need to be upgraded to other options at some point.

0 Comments
Continue reading

Tip of the Week: How to Keep a Laptop Tidy

Tip of the Week: How to Keep a Laptop Tidy

I don’t mean to gross you out, but have you ever considered how disgusting your laptop is? Studies have compared the relative cleanliness of a keyboard and a toilet seat… and unfortunately, the keyboard wasn’t the cleaner of the two. This is why it makes sense to regularly give your laptop devices a good cleaning, and why we’ve put together some tips to ensure you safely sanitize a laptop device.

0 Comments
Continue reading

Will U.S. Leaders Consider Data Privacy?

Will U.S. Leaders Consider Data Privacy?

Over 90 percent of people in the United States feel like their data is out of their control, and judging from the impression that the European Union’s General Data Protection Regulation left on the world, it’s surely not going to be the last piece of privacy legislation that is issued. Still, will it be enough to urge certain governments and organizations to practice what they preach? The results could have long-lasting effects on businesses, as well.

0 Comments
Continue reading

Increased Automation Is Worrying the Workforce

Increased Automation Is Worrying the Workforce

Automation has helped many businesses improve operations, but at what cost to the people that work for these organizations? Many systems rely on the autonomy of artificial intelligence systems to keep certain tasks and workflows on point. Automation could replace up to a quarter of the current workforce in the next ten years, so people are naturally skeptical and worried about their jobs in the near future.

0 Comments
Continue reading

Tip of the Week: Using Cloud Services for Your Business

Tip of the Week: Using Cloud Services for Your Business

For this week’s tip, we thought we’d talk about something that most businesses have already dabbled in: the cloud. If your business is like those that we interact with, you’ve already implemented some type of cloud service, but if you haven’t, you should know just how cloud-hosted services can benefit the small business. We’ll look at the benefits of cloud-hosted services and how to pick which services are right for you.

0 Comments
Continue reading

Phishing Attacks Are Besting Two-Factor Authentication--Now What?

Phishing Attacks Are Besting Two-Factor Authentication--Now What?

What has proven to be one of the more effective ways of preventing phishing attacks may be under fire from more advanced threats designed specifically to penetrate the defenses of two-factor authentication. This means that users need to be more cognizant of avoiding these attacks, but how can you help them make educated decisions about this? Let’s start by discussing the phishing attacks that can beat 2FA.

0 Comments
Continue reading

Interpreting Analytics Isn’t Always Cut and Dry

Interpreting Analytics Isn’t Always Cut and Dry

In business, making good decisions is a must. You have to manage risk well. Today’s business is using analytics to drive decision making, and therefore needs to design and implement platforms that make this possible. If a business doesn’t properly set up their analytics or intelligence systems, their decisions may not be made with a useful perspective. Let’s take a look at these systems to see if you may be being fooled by your own numbers.

0 Comments
Continue reading

Cable Modem Considerations

Cable Modem Considerations

For those of us that don’t have access to fiber-to-the-home or LTE Internet, the cable modem is a must-have. You can always rent a modem from your ISP or you can purchase your own, but no matter what your decision is, knowing what to look for when modem shopping is advantageous. Let’s take a look.

0 Comments
Continue reading

Reliable Communications Help Build Better Relationships

Reliable Communications Help Build Better Relationships

Communication plays a critical role in the way you develop relationships and clients. To optimize communication with your clients and customers, proper use of technology is essential, but it also makes for a much nicer experience from an operational standpoint. How can your business utilize this powerful communications technology?

0 Comments
Continue reading

Are We Giving Virtual Assistants Too Much Leeway?

Are We Giving Virtual Assistants Too Much Leeway?

Virtual assistants have seen an increased usage in the workplace, improving general productivity, but not without placing organizations at considerable risk if left unchecked. Depending on how much you rely on virtual assistants, you might want to take a closer look at what data is being accessed by them, and the role they play in your organization.

0 Comments
Continue reading

Tip of the Week: Follow These Steps Before You Upgrade

Tip of the Week: Follow These Steps Before You Upgrade

Why do manufacturers and developers constantly issue updates and upgrades to their software and hardware solutions? A business’s IT solutions might seem like something you want to set up and not think about ever again, but this is simply not how the cookie crumbles. This week’s tip is dedicated to why your organization needs to have a strategy in place to approach your upgrades.

0 Comments
Continue reading

How to Prioritize Tasks to Boost Productivity

How to Prioritize Tasks to Boost Productivity

Productivity is something that either happens or it doesn’t, but it’s important to keep in mind that nobody can work at optimal efficiency at all times. This doesn’t mean you can’t leverage some best practices to make better use of your time, though. Today we’ll examine three general ways to improve your productivity, including examples of how to make them happen.

0 Comments
Continue reading

If Your Business Has a Problem, There Is Some Tech to Fix It

If Your Business Has a Problem, There Is Some Tech to Fix It

Your business’ finances are something that weighs heavily on your mind at all times, whether it’s paying your employees or ensuring healthy acquisition of new hardware or software. Cash flow for businesses doesn’t have to be hard, though you wouldn’t know it, according to a recent report from Intuit.

0 Comments
Continue reading

Tip of the Week: This Quick IT Quiz Will Help the Small Business

Tip of the Week: This Quick IT Quiz Will Help the Small Business

When a business uses its technology the right way, it typically has positive effects on the business. That’s not to say that technology is a major priority for EVERY business. There are some business owners that don’t prioritize having the newest, shiniest technology on the market; and, that’s fine, if the business functions efficiently.

0 Comments
Continue reading

Windows 7 End of Life Sneaking Up on Some Businesses

Windows 7 End of Life Sneaking Up on Some Businesses

All good things must come to an end eventually, and Windows 7 is no different. Microsoft is officially ending its support of this operating system relatively soon, but this doesn’t mean that you should jump ship without a plan. In fact, Microsoft realizes that some businesses and organizations simply can’t make the jump in time, so they have implemented contingency plans for these companies. The problem is that it’s expensive. We’ll walk you through everything there is to know about how Microsoft is handling the end of life events for Windows 7.

0 Comments
Continue reading

Tip of the Week: Handy Google Chrome Shortcuts

Tip of the Week: Handy Google Chrome Shortcuts

It’s no secret how useful the Google Chrome browser is to a user. What is a secret, however, is that Chrome has some added capabilities that make it even more useful than first impressions would suggest. For our Tip of the Week, we’ll review some of these capabilities so you can implement them into your daily workflows.

0 Comments
Continue reading

Taking a Trip Through Data Privacy, Part II

Taking a Trip Through Data Privacy, Part II

Earlier this week, you may have seen the first part of this article, where we discussed how robocallers collect your information. Today, we continue our discussion on data privacy and what you can do to keep your organization and personal data safe.

0 Comments
Continue reading

Taking a Trip Through Data Privacy, Part I

Taking a Trip Through Data Privacy, Part I

Protecting your business’ data is no simple task. To make it as secure as possible, you’ll have to understand how personal data flows through online channels. We’re digging pretty deep with this one, so get ready for an informative and, if nothing else, interesting read. This topic is especially important in an age where Facebook and Google exist, but there are countless other threats to data privacy out there that we all experience on a regular basis--business or not.

0 Comments
Continue reading

5 Reasons IT is Stressed About Security

5 Reasons IT is Stressed About Security

If you have an internal IT administrator, they might be pretty stressed about your business’ security. Why? Simple - there’s a good chance that they feel trapped in a few common situations. Let’s review some stresses that influence IT employees, negatively affecting your security.

0 Comments
Continue reading

Tip of the Week: Improve Collaboration With Process

Tip of the Week: Improve Collaboration With Process

Like a well-oiled machine, any business needs its internal components to line up correctly, interacting with the others to accomplish the ultimate goal of the device. This is more or less how we always describe collaborative processes in the context of your IT. Here, however, we’re going to focus our tip on ensuring these processes are directed by employees who are ready to collaborate as well.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

IT Consultant Gmail Applications Emails Computing Infrastructure Managed IT Services Tip of the Week Data Breach User Tip Data Security Solid State Drive it support Network Security Electronic Medical Records Processor Travel Innovation Reliable Computing Microsoft Disaster Recovery Social Engineering Tech Device security Antivirus tech support Staten Island Integration Windows 10 Management Education Collaboration Search Recovery Proxy Server computer repair Staten Island Private Cloud IT support Staten Island Internet of Things Access Control Patch Management Unified Communications Username Hiring/Firing Wi-Fi Memory Data storage IT support New York City computer support NYC Outsourced IT CCTV Equifax Automobile Data Backup Webcam Windows XP Computing Analytics managed IT services NYC Business Document Management Staten Island IT support Drones Voice over Internet Protocol Data Phishing Bluetooth Office Digital Term IT support firms Conferencing computer support Accountants Project Management Cortana IT support Society Business Continuity Cybercrime Hackers WiFi Customer Resource management Apps IT Services PowerPoint Retail Virtual Assistant Compliance Staten Island tech support Physical Security Experience eWaste App Gamification Law Enforcement Social Distributed Denial of Service User Tips IT Management Supercomputer Customer Service Bookmark Google Microchip malware worms Security Running Cable History Tech Terms Google Drive The Internet of Things HTML Hard Drive Disposal Telephony Workstations IT services NYC Mobile Security Writing IT Support IBM Telephone System Hosted Solution Processors Bandwidth Knowledge Printers Trends Microsoft Excel managed services Tech Support Paperless Office Laptops Legislation Cryptocurrency data recovery Mobile Devices CryptoLocker Audit Excel Vendor Email Miscellaneous Network Management Automation Managed IT Services Internet Lenovo Websites Tablets Hack Business Computing Evernote Tactics Microsoft 365 Database Hardware Google Play Mobile Technology Professional Services DDoS iPhone Error Banking Powerful Technology Solutions Vulnerability Screen Reader Corporate Profile Hacks computer services Windows Worker datto Holiday Telephone Update Cache data loss Apple Rental Service Piracy tech support Streaming Media Backup and Disaster Recovery tech support Staten Isalnd malware Hard disk Modem Maintenance Download Uninterrupted Power Supply Vendor Mangement SharePoint Vendor Management Hacker Smartphone Language Content Filtering Content Blockchain Saving Time Multi-factor Authentication Devices Tablet Web Server computer support firms Hard Drive Addiction Startup Firewall Printer Multi-Factor Security Passwords Deep Learning Software as a Service Health IT Botnet Thank You Virtual Reality Microsoft Office BYOD IT consulting Motion Sickness Touchscreen Google Maps Productivity Efficiency Tracking Work/Life Balance Telephone Systems Operating System managed it services Comparison Encryption Software Help Desk Productivity Mobility Cabling Redundancy G Suite Relocation In Internet of Things Spam Office 365 Transportation Wireless Headphones Privacy Smartphones Staten Island IT consulting Hardware Solutions Navigation Remote Monitoring Save Money Managed Service File Sharing BDR data recovery Staten Island Health Best Practice Upload Office Tips Business Metrics Downtime IT consulting NYC CrashOverride Server Virus Computers Android Regulation Laptop Monitoring Bitcoin Virtual Desktop Software License Facebook Accidental deletion Social Media Downloads Start Menu Bring Your Own Device Taxes Spyware Desktop Business Growth Lithium-ion battery Business Cards Flexibility Displays Text Messaging Medical IT Employer-Employee Relationship Mobile Device Management Scam Malware Training Black Market Tip of the week Two-factor Authentication Administrator Wireless Technology Business Mangement Google Calendar Government YouTube Fake News Technology Chromebook computer services Staten Island Browser Mouse Quick Tips Managed Service Provider Settings Managing Stress Computer Identity Theft Managed IT Money Safety Legal Flash Staffing Staten Island computer support Solutions 3D Printing Gadgets VoIP Windows 10 Virtualization Cloud Directions Data Management Communication Vulnerabilities Network Congestion Windows 8 Small Business SaaS Healthcare Business Management Data Protection Documents Advertising Hacking Disaster computer repair Digital Payment Social Network Best Practices Budget Twitter Going Green Augmented Reality Wireless Company Culture Computer Care Regulations Cost Management Data Analysis Workplace Tips Access Politics IT consulting company Word Nanotechnology IT support Staten Islans Meetings IT consulting Staten Island Fileless Malware Google Docs Website SSID end-user files PDF Alert IT consulting firms Network Information Technology Remote Computing Notifications Printing Cloud Computing Music Specifications Machine Learning managed IT services staten island Securty Freedom of Information Cybersecurity VoIP Domains Computer Malfunction IT consulting firm LiFi Hosted Solutions ransomware attacks Monitors News Employer Employee Relationship Congratulations IT support NYC Ransomware IT consulting Staten island Networking How To End of Support Password Unified Threat Management Browsers Cooperation IT services New York City Big Data Google Wallet Service Level Agreement Business Technology Robot Scalability Public Cloud Windows 7 Proactive IT Tech Term Sports Visible Light Communication Television today ’s organizations Saving Money Router Time Management Entertainment VPN Administration Artificial Intelligence Information Security Cameras Upgrade Cloud computing Staten Island Mobile Device Cleaning Backup email scam IT services Staten Island Users staten island managed services Unified Threat Management Workers Outlook communications Emergency managed services Staten Island Samsung computer support Staten Island

Newsletter Sign Up