Home

    Body Temp Scanners

    About Us

    • Who We Are
    • Our Difference
    • IT Industry Secret
    • Employment
    • Refer a Colleague or Friend

    IT Services

    • Managed IT Services
      • Managed Services
      • IT Consulting
      • Comprehensive IT Support
      • Remote Monitoring and Maintenance
      • IT Vendor Management
      • Co-Managed IT
      • Desktop Monitoring and Management
      • Infrastructure Support Services
      • Professional Server Support
      • vCIO
      • Business Computing Assessment
    • IT Security Services
      • Network Security
      • Unified Threat Management
      • Content Filtering
      • Spam Protection
      • Security Cameras
        • Thermal Body Temperature Camera Solutions
      • Email Encryption
      • Fully Hosted Security as a Service
      • Security Networking
      • Access Control Solutions
    • Cloud Computing Services
      • Cloud IT Solutions
      • Hosted Server
      • Hosted Desktop
      • Hardware Virtualization
      • Cloud Backup & File Sharing
    • Industry Specific
      • Health Care IT
      • IT for Law
      • Manufacturing IT
      • Point-of-Sale Technologies
      • IT for Education
      • IT for Accountants
      • Retail IT
      • IT for Engineers and Architects
    • Data Services
      • Business Continuity
      • Data Retrieval
      • Disaster Recovery as a Service
    • Hardware Services
      • Hardware as a Service
      • Computer Repair
      • Cabling and Wiring
      • Wireless Services
      • High-Speed Internet Consulting
      • Printer Management
      • Office Relocation Services
      • Server Migration
    • Software Services
      • Microsoft Office 365
      • G Suite by Google
      • Microsoft Partner Network
    • Business Communication
      • VoIP
      • Fax Server
      • Conferencing
      • Digital Signage
      • Unified Communications
    • Media & Internet Services
      • Website Design

    Understanding IT

    • Ransomware
    • Shadow IT
    • The Modern Office
    • IT Threat Glossary
    • Business Continuity
    • Windows 10
    • The Internet of Things
    • Network Security
    • BYOD
    • PCI DSS
    • HIPAA
    • Cloud Computing

    News

    Blog

    Contact Us

    Support

    • Help Desk
    • Remote Support Tool
logo

(844)GEEK-BOX

  • Home
  • Body Temp Scanners
  • About Us
    • Who We Are
    • Our Difference
    • IT Industry Secret
    • Employment
    • Refer a Colleague or Friend
  • IT Services
    • Managed IT Services
      • Managed Services
      • IT Consulting
      • Comprehensive IT Support
      • Remote Monitoring and Maintenance
      • IT Vendor Management
      • Co-Managed IT
      • Desktop Monitoring and Management
      • Infrastructure Support Services
      • Professional Server Support
      • vCIO
      • Business Computing Assessment
    • IT Security Services
      • Network Security
      • Unified Threat Management
      • Content Filtering
      • Spam Protection
      • Security Cameras
        • Thermal Body Temperature Camera Solutions
      • Email Encryption
      • Fully Hosted Security as a Service
      • Security Networking
      • Access Control Solutions
    • Cloud Computing Services
      • Cloud IT Solutions
      • Hosted Server
      • Hosted Desktop
      • Hardware Virtualization
      • Cloud Backup & File Sharing
    • Industry Specific
      • Health Care IT
      • IT for Law
      • Manufacturing IT
      • Point-of-Sale Technologies
      • IT for Education
      • IT for Accountants
      • Retail IT
      • IT for Engineers and Architects
    • Data Services
      • Business Continuity
      • Data Retrieval
      • Disaster Recovery as a Service
    • Hardware Services
      • Hardware as a Service
      • Computer Repair
      • Cabling and Wiring
      • Wireless Services
      • High-Speed Internet Consulting
      • Printer Management
      • Office Relocation Services
      • Server Migration
    • Software Services
      • Microsoft Office 365
      • G Suite by Google
      • Microsoft Partner Network
    • Business Communication
      • VoIP
      • Fax Server
      • Conferencing
      • Digital Signage
      • Unified Communications
    • Media & Internet Services
      • Website Design
  • Understanding IT
    • Ransomware
    • Shadow IT
    • The Modern Office
    • IT Threat Glossary
    • Business Continuity
    • Windows 10
    • The Internet of Things
    • Network Security
    • BYOD
    • PCI DSS
    • HIPAA
    • Cloud Computing
  • News
  • Blog
  • Contact Us
  • Support
    • Help Desk
    • Remote Support Tool

GeekBox IT, LLC Blog

GeekBox IT Blog

Remember When Apple Recommended Physical Persuasion to Fix a Computer?

Written by GeekBox IT
Published: 28 Nov 2022
Remember When Apple Recommended Physical Persuasion to Fix a Computer?

Apple has long been a key part of the technology industry, producing quality hardware year after year. Although Apple tends to produce sleek and high-end hardware running its proprietary operating systems, these devices are far from perfect and were especially controversial at certain points in the past.

Read more...  Add new comment 

Posted in Blog, Off Topic/Fun  
Tagged Hardware, IT Support, Vendor  

 

Everything You Need to Know About Patch Tuesday

Written by GeekBox IT
Published: 19 Oct 2022
Everything You Need to Know About Patch Tuesday

In the technology news sector, you’ve probably noticed a trend where Patch Tuesday makes headlines at least once a month. This is generally the day when Microsoft issues patches and security updates for its many different technologies, and it’s important for your IT department to know when Patch Tuesday falls each month.

Read more...  Add new comment 

Posted in Blog, Security  
Tagged Best practices, Security, Vendor  

 

What Happens to a Recycled Computer?

Written by GeekBox IT
Published: 01 Dec 2021
What Happens to a Recycled Computer?

Do you know what you are supposed to do with electronics that are no longer of any use? Let’s quickly go over the process of properly disposing of electronic devices and the steps that make up the procedures involved.

Read more...  Add new comment 

Posted in Blog, Technology  
Tagged Computer, Hardware, Vendor  

 

What You Need to Know About the Massive Solarwinds Hack

Written by GeekBox IT
Published: 01 Jan 2021
What You Need to Know About the Massive Solarwinds Hack

2020 has been filled to the brim with adversity and just as we’ve mercifully arrived to the end, the largest and most brazen cyberespionage attack ever has been carried out. Today, we’ll tell you what we know about the attack, what problems it caused, and what we should learn from it going forward.

Read more...  Add new comment 

Posted in Alerts, Blog  
Tagged Network Security, Security, Vendor  

 

There’s Value in Outsourcing Your IT, Part III

Written by GeekBox IT
Published: 07 Oct 2019
There’s Value in Outsourcing Your IT, Part III

When you need something done that requires a level of skill or experience or knowledge that you don’t have, what do you do? Generally, you call in someone who has the required skill, experience, or knowledge that is required. Your business’ information technology strategy should be approached in the same way. As we continue our

Read more...  Add new comment 

Posted in Best practices, Blog  
Tagged Managed Services, Outsourced IT, Vendor  

 

Mobile? Grab this Article!

Tag Cloud

Android Best practices Business Business Computing Cloud Collaboration Communications Computer Cybersecurity Data Disaster Recovery Efficiency Email Google Hackers Hardware Hosted Solutions Innovation Internet IT Services IT Support Malware Managed IT Services Microsoft Miscellaneous Mobile Device Mobile Devices Network Security Phishing Privacy Productivity Quick Tips Ransomware Remote Security Small Business Smartphones Software Technology Tip of the Week Users User Tips VoIP Workplace Strategy Workplace Tips
Home > Vendor

Latest Blog

Three Ways You Can Immediately Improve Your Cybersecurity

Cyberattacks are a major issue for everyone and especially for businesses. In fact, if you don’t have a solid handle on the actions you take, your IT may be more exposed than you think. We thought we would go through a few really simple actions you can take to enhance your security posture. Read More

Contact Us

Learn more about what GeekBox IT
can do for your business.

(336) 790-1000

GeekBox IT
1250 Revolution Mill Drive
Suite 166
Greensboro, NC 27405

facebook RSS feed

About GeekBox IT

GeekBox IT strives to provide the best comprehensive IT, Computer, and Networking services to small businesses. We can handle all of your organization's technology challenges, starting with planning, implementing, and supporting the IT solutions that are critical to your growth and success.
About Us

Privacy Policy | Terms & Conditions | Copyright GeekBox IT.   All Rights Reserved.
Powered by JoomConnect

S5 Box – Login

Publish a login form or anything you want to this position.

S5 Box – Register

Publish a registration form or anything you want to this position.