Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.

Logo

 
 Popular Services
 (347) 830-7322

Logo

 

Tekie Geek Blog

Tekie Geek has been serving the Staten Island, Brooklyn, Queens, Bronx, New York City, Long Island and New Jersey area since 2012, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Use Any Internet Connection with a VPN

Use Any Internet Connection with a VPN

How often does your business have employees traveling to conferences or working remotely due to circumstances or physical location? With technology improving at a rapid pace, these opportunities are more possible now than they ever were in the past, and depending on the solution implemented, they are far more efficient, too. Of course, one thing that will never change is the need to keep company data secure, no matter what type of Internet connection is being utilized.

Tags:
0 Comments
Continue reading

Diagnosing a Man-In-the-Middle Attack

Diagnosing a Man-In-the-Middle Attack

The man in the middle has a lot of power and influence over the end result, and this is true even in the technological world. In fact, there are attacks dedicated to this vector, twisting and turning something that your organization needs into what amounts to a threat. We’ll discuss what a Man-in-the-Middle (MitM) attack is, as well as what you can do to combat these threats.

0 Comments
Continue reading

Tip of the Week: File Management Tips

Tip of the Week: File Management Tips

Thanks to file management systems that can be digitized and stored online, filing cabinets can be considered a thing of the past. Of course, you still have to keep digital filing systems organized, but this is easier to do and more efficient than paper files. Today, we provide you with tips on how to ensure that you can keep your files in proper order.

0 Comments
Continue reading

Data Backup Carries Powerful Value

Data Backup Carries Powerful Value

World Backup Day is a time when every business should contemplate whether or not they have proper data backup strategies in place. Considering it was about a month ago, did your organization take the time to think about it? Granted, there isn’t a single day in the year that could explain what your data means to your business, the importance of data backup, and that your businesses should always do what it can to avoid data loss.

0 Comments
Continue reading

Will U.S. Leaders Consider Data Privacy?

Will U.S. Leaders Consider Data Privacy?

Over 90 percent of people in the United States feel like their data is out of their control, and judging from the impression that the European Union’s General Data Protection Regulation left on the world, it’s surely not going to be the last piece of privacy legislation that is issued. Still, will it be enough to urge certain governments and organizations to practice what they preach? The results could have long-lasting effects on businesses, as well.

0 Comments
Continue reading

A Testimonial From the North Pole

A Testimonial From the North Pole

We’ve always been a proponent of preparing for the worst and hoping for the best where a business’ solutions are concerned. That’s why we were happy to receive an email from our friends at the North Pole telling us about a situation they ran into just a few days ago...

0 Comments
Continue reading

Antivirus, Analyzed

Antivirus, Analyzed

Antivirus is a crucial component to any network security platform, but do you know how it works? Below, we’ll go over how your security is improved by an antivirus solution.

0 Comments
Continue reading

Want Proof that You Need to Monitor Your Solutions?

Want Proof that You Need to Monitor Your Solutions?

When discussing the practice of monitoring solutions to prevent threats, it isn’t uncommon for many businesses to put these concerns on the back burner. However, every so often, an example comes around to help inspire businesses to take their monitoring seriously. This time, the example was the arrest of 24 spammers in October for scamming American citizens by impersonating Microsoft support staff members.

0 Comments
Continue reading

How Machine Learning Can Help Our Health

How Machine Learning Can Help Our Health

Machine learning has become a big deal in a variety of industries, healthcare being a prime example. There are a variety of applications for machine learning in this incredibly important field, all of which show great potential in improving patient care. Below, we dive into just a few examples of how machine learning can improve healthcare.

0 Comments
Continue reading

A Brief History of Data Backup

A Brief History of Data Backup

While data backup is a necessary component to any modern business’ success, the idea itself certainly isn’t modern. The act of protecting information dates back to before dates were even an inkling, when humanity was still writing data on cave walls to preserve it and notching animal bones to aid in primitive mathematics. Let’s review the history of data preservation, and how we’ve gotten to our current point.

0 Comments
Continue reading

Tip of the Week: Using Less Data on Android

Tip of the Week: Using Less Data on Android

Mobile data is extremely important to the productivity and efficiency of modern businesses--especially when employees and administrators are out of the office. The major drawback of this is that it can be an expensive setup, as mobile data transfer can be pricey. We can help you get around this issue by minimizing the amount of data your Android device uses.

0 Comments
Continue reading

BaaS Lets You Take Decentralization for a Test Drive

BaaS Lets You Take Decentralization for a Test Drive

One of the biggest problems with emerging technologies is the fact that it can be very hard to tell if they will actually provide any benefit to a business without taking the risk of implementing it. This leaves many businesses in a catch-22 of sorts: they lose money by not implementing a new solution, or they lose money because the new solution wasn’t a good fit.

0 Comments
Continue reading

Technology Basics: Bits and Bytes

Technology Basics: Bits and Bytes

In business, everything is measured. Every minute is quantified in order to run the most profitable business possible. When measuring data the measurements you’ll most hear are in bits and bytes. Today, we’ll get into the various ways bits and bytes are used to describe the technology we all use.

0 Comments
Continue reading

This Data Privacy Day, the NCSA Wants You to STOP. THINK. CONNECT.

This Data Privacy Day, the NCSA Wants You to STOP. THINK. CONNECT.

January 28th marks Data Privacy Day, a day intended to raise awareness of the importance of data privacy and educate users and business owners of its benefits. Spearheaded by the National Cyber Security Alliance, there are plenty of lessons the NCSA has to share with businesses as this day puts their, and their clients’, privacy in the spotlight.

0 Comments
Continue reading

Where Does Deleted Data Go?

Where Does Deleted Data Go?

Have you deleted a file and immediately regretted it? Well that may be easy enough to get the file back. What if your intention was to make that file disappear for good? Then you have to understand that the way many operating systems handle the deletion of files may present problems for you.

Recent comment in this post
Grayson
Okay wow this is not bad for someone who doesnt rely on bestessays i mean its a way of life and yet you ignore the possibilities!!... Read More
Saturday, 14 July 2018 12:12
1 Comment
Continue reading

How Easily Could A Freak Event Take Down Your Business?

How Easily Could A Freak Event Take Down Your Business?

Your business is much more vulnerable to dangerous entities than you’d care to admit. Think about it--all it takes is one unexpected event to cause untold amounts of chaos for your business. To make matters worse, these events are often outside of your control. Data loss incidents might be unpredictable, but they can be soothed thanks to a little bit of preventative management.

0 Comments
Continue reading

You Can Save Money By Hosting Data in the Cloud (Depending How You Do It)

You Can Save Money By Hosting Data in the Cloud (Depending How You Do It)

Cloud computing is taking the business world by storm. Despite this, not every organization has made the switch. While every company that hasn’t yet migrated to the cloud has their reasons, one big reason often tops the list: the perceived lack of cost savings. Thanks to a new study, this perception is now proven to be inaccurate.

0 Comments
Continue reading

The Fallout From Data Loss Isn’t Pretty

The Fallout From Data Loss Isn’t Pretty

Data loss: it’s not a fun term for any business to hear. However, when one considers all of the ramifications that data loss can have upon a business, it swiftly transitions from “not fun” to “alarming.” Have you taken the time to think about what losing your business’ data would really mean for your company?

0 Comments
Continue reading

IBM Drops Bomb on the Industry By Storing Data on an Atom

IBM Drops Bomb on the Industry By Storing Data on an Atom

Data storage has long been a major pain point for technology development, but a rather large (or small) breakthrough has resulted in data being stored on a single atom. The development comes from researchers at IBM, and it could have a potentially nuclear impact on the way that data storage functions.

0 Comments
Continue reading

After a Hacker Stole 1.17 Billion Credentials, What He Did Next Will Leave You Dumbfounded

After a Hacker Stole 1.17 Billion Credentials, What He Did Next Will Leave You Dumbfounded

Unfortunately, stories of major data breaches are the norm in today’s news cycle. However, what often gets left out of the story is how the hacker profits from the stolen data. In the case of a recent major hack in Russia of more than one billion credentials, what the hacker did with all of this data has us scratching our heads.

0 Comments
Continue reading