

Search Results
55 results found with an empty search
Blog Posts (34)
- Prompts From the End of Time
It was a good run The End of The World, John Martin, c.1851-53 As the world hurtles toward climatologic and ecologic catastrophe, with many of its nations’ leaders concluding that hitting the accelerator on capitalism’s infinite growth mandate is the best course of action, let’s take a step back and examine the single greatest technological menace to life on Earth. We’ve covered enshittification before, and it shows no signs of abating or reversing course. Generative AI, however, is not merely a byproduct of enshittification: it actively foments and enshittifies by its very nature. Artificial intelligence has become the primary growth engine of the American economy. Harvard economist Jason Furman claims 92% of GDP growth from the first half of 2025 is attributable to AI investment. While the idea that a massively overhyped, still unproven technology underpins the majority of our economic growth is disturbing, the series of events harkens back to the dotcom bubble of the late ‘90s . The parallels are eerie: massive, cross-industry investments; ceaseless marketing and integration of AI features into almost every tech product we use; eye-watering valuations of AI companies that haven’t turned a profit yet . There is no shortage of analysts who don’t believe AI companies even have a path to profitability. The desperately absurd energy requirements and carbon footprints of new AI datacenters likewise puzzle and horrify: OpenAI recently struck a deal with Broadcom to develop 10 gigawatts of additional AI datacenter capacity, roughly the energy usage of a large American city. Naturally, AI’s purveyors see nothing but upside here. Additional capacity will enable amazing, incredible features that make your life as a faceless consumer of AI slop better. And, most critically, additional investment will make early investors in AI companies like OpenAI and Anthropic even richer. That’s the headline here, in case you missed it. Sam Altman himself, CEO of OpenAI, is never very long on detail when it comes to just how AI will change the world, or how it will do so in a sustainable or ethical way, but he’s sure it will. Never mind that his company’s flagship product only exists because of large-scale theft of creative works produced by actual human beings. And don’t pay any attention to the fact that the world’s largest insurance companies can’t insure the likes of OpenAI because the scale of potential (and pending) legal claims against those companies is so grand. Meanwhile, Elon Musk’s ever-hallucinatory, increasingly racist and Fascist AI model, Grok, now runs on new xAI datacenter infrastructure in Memphis, Tennessee where its nitrogen oxide (NOx) emissions are estimated at 1200 to 2000 tons per year—vastly higher than neighboring fossil-fuel-powered interests. The xAI datacenter is located in an area of South Memphis already known for its high smog levels and state-leading asthma hospitalizations. Politico reports : The turbines are only temporary and don’t require federal permits for their emissions of NOx and other hazardous air pollutants like formaldehyde, xAI’s environmental consultant, Shannon Lynn, said during a webinar hosted by the Memphis Chamber of Commerce. The argument appears to rely on a loophole in federal regulations that environmental groups and former EPA officials say shouldn’t apply to the situation. Given Elon Musk’s hot-and-cold relationship with current President and convicted felon Donald J. Trump, it may not be too surprising that the xAI datacenter in Memphis retains carte blanche to pollute with impunity, ignoring federal regulations and the Clean Air Act in the process. EPA Administrator Lee Zeldin has championed the deregulation of environmental protection standards, claiming the agency’s goal is now: “driving a dagger straight into the heart of the climate change religion to drive down cost of living for American families, unleash American energy, bring auto jobs back to the U.S. and more,” This hand-in-glove arrangement between the current regime in Washington and the AI-focused companies who have so generously supported them comes at a time when political capital should be spent on driving down emissions, not increasing them. Of course, Sam Altman and Elon Musk’s goals, and the goals of the AI ouroboros, are incompatible with such ‘strict’ emissions standards; if tech continues to have its way, we will likely only see emissions targets further reduced. I appreciate that this topic is fraught and politically charged; AI is being deployed at a scale that precious few had any inkling of even five years ago. But this is rather the point: the longer we refuse to confront the deep interrelations between AI, policy, and our own environment, the closer we walk to cataclysm. Granted, this isn't the bubbly, "I support technological advancement at literally any cost" pseudo ad copy you'll read elsewhere on the Internet, but I don't have affiliate links and I don't make money from lying to you. Generative AI’s growth is unsustainable; its promises are largely unfulfilled; our economy’s dependence on its success leaves us open to existential threats to our current way of life; the politics encouraging the AI bubble are diametrically opposed to the politics needed for a habitable planet; the privacy and safety implications of AI models without actual guardrails are dystopian; AI as a tool can and will be used by hostile governments to identify and punish dissenters. For all its potential, AI is a loaded gun and those most prominently and publicly championing its rapid adoption are confidence-men at best, and deeply malicious, narcissistic grifters at worst.
- Business Email Compromise Attack Volume Increased 37% Between May 2024 and June 2025 – Is Your Business at Risk?
Cybercriminals aren’t slowing down; they’re getting smarter. A recent industry report found that Business Email Compromise (BEC) attacks surged by 37% in just over a year, from May 2024 to June 2025. That’s not a small uptick: that’s a sign that attackers are finding success and doubling down. If your business relies on email to communicate with clients, vendors, or employees (and whose doesn’t?), this is a wake-up call. BEC attacks are not your typical phishing scams. They don’t rely on mass spam campaigns or clumsy one-off emails. Instead, they involve highly targeted, socially engineered attacks designed to trick your team into transferring money, sharing sensitive data, or revealing login credentials. Think of them as cyber-fraud mixed with impersonation: attackers often compromise or spoof a real mailbox and then send what appears to be a legitimate email--sometimes even from a known executive. Why the surge? The answer lies in attackers’ return on investment. Unlike ransomware, which is noisy and risks triggering incident response, BEC is relatively quiet. It requires little to no malware – meaning it often evades traditional antivirus or endpoint security tools. Attackers have figured out that manipulating human trust yields faster payouts with fewer technical hurdles. Small and mid-sized businesses are particularly vulnerable. Many don’t have advanced threat protection enabled, don’t enforce multi-factor authentication on email accounts, and don’t have a formal process for verifying financial transactions. A single successful BEC can cost tens of thousands of dollars – not just in stolen funds, but in downtime, incident response, and potential reputational harm. The FBI’s IC3 report consistently ranks BEC as the #1 costliest cybercrime year after year. 📊 Quick Stats: Business Email Compromise at a Glance Average loss per BEC incident: $125,000+ SMBs targeted in past 12 months: 43% Total reported losses (2024): $2.9 billion+ Attack entry points: 75% via spoofing or account takeover Prevention potential: 90% could be stopped with better verification processes The good news: BEC is preventable. A combination of technical controls and staff awareness training dramatically lowers risk. At minimum, businesses should enforce multi-factor authentication across all email accounts, enable advanced phishing protection in Microsoft 365 or Google Workspace, and create a clear “out-of-band” process for approving wire transfers or banking changes. This means no payment should be authorized solely based on an email. Security awareness training is another critical layer. Employees should learn to spot red flags such as urgent requests, unusual banking details, or slightly altered email domains. Simulated phishing campaigns can test your team’s readiness and help identify users who may need extra coaching. The human layer is often the last line of defense – strengthening it pays dividends. Monitoring and response are also crucial. Your IT partner should review sign-in logs for what Microsoft calls “impossible travel” (signing in from physically disparate locations within impossible timeframes) or suspicious activity, setting conditional access policies, and alerting on forwarding rules that may have been maliciously configured. This proactive monitoring ensures that if an account is compromised, you can respond before the attackers cash out. At Geeks for Business, we help businesses implement a layered security approach that includes advanced email protection, identity security, and user training. If this increase in BEC attacks concerns you, you’re not alone, and you don’t have to face the threat alone. Schedule a security consultation with our team today and let’s make sure your business doesn’t become the next statistic. Real-World BEC Examples and Lessons Learned Case Study 1: A manufacturing firm lost $240,000 after an attacker gained access to the CEO’s mailbox and sent realistic-looking wire transfer requests. The funds were sent overseas before IT discovered the compromise. Case Study 2: A California CPA firm suffered a $90,000 loss when a vendor's email account was spoofed. The fake invoice matched previous formatting and was paid without question. The firm later had to cover client losses out of pocket. Case Study 3: A healthcare provider narrowly avoided a $300,000 loss thanks to a vigilant employee who noticed a slightly altered email domain. The event still cost $25,000 in forensics and recovery efforts. Case Study 4: A boutique software development firm in Europe lost approximately $285,000 to wire fraud as a result of BEC. The attacker gained access to the company’s Microsoft tenant via the widely deployed Evilginx phishing toolkit and began reconnaissance and information-gathering. Three months later, the attacker began intercepting and redirecting emails between company executives, a third-party organization, and the company’s internal finance department. The accountant mistook a fraudulent wire request for a legitimate email and mistakenly paid out a large sum of money to the attacker. Unfortunately, the funds were not recovered. The average costs of one instance of Business Email Compromise Direct Financial Loss $50,000 - $250,000+ per incident Incident Response & Forensics $10,000 - $50,000 Legal & Compliance Fees $5,000 - $20,000 Downtime/Lost Productivity Hundreds of staff-hours Reputational Damage Loss of client trust, potential churn At Geeks for Business, we help organizations implement multi-layered defenses, continuous monitoring, and employee training to stop BEC before it impacts your bottom line. Request your free security posture review today.
- Beware of these emerging cyberthreats in 2024
The global cost of a data breach last year was $4.45 million . This is an increase of 15% in three years. As we step into 2024, it's critical to be aware of emerging technology threats--threats that could potentially disrupt and harm your business. Technology is evolving at a rapid pace. It’s bringing new opportunities and challenges for businesses and individuals alike. Rapid developments in artificial intelligence (AI), machine learning (ML), and quantum computing are leading companies across all industries to radically reconsider their approach to cybersecurity and systems management. While these technologies are poised to make our lives easier, they're also being used to launch sophisticated, large-scale attacks against the networks and devices we depend on. In this article, we’ll highlight some emerging technology threats to be aware of in 2024 and beyond. Data Poisoning Attacks Data poisoning involves corrupting datasets used to train AI models. By injecting malicious data, attackers can skew algorithms' outcomes. This could lead to incorrect decisions in critical sectors like healthcare or finance. Some actions are vital in countering this insidious threat. These include protecting training data integrity and implementing robust validation mechanisms. Businesses should use AI-generated data cautiously. It should be heavily augmented by human intelligence and data from other sources. 5G Network Vulnerabilities The widespread adoption of 5G technology introduces new attack surfaces. With an increased number of connected devices, the attack vector broadens. IoT devices, reliant on 5G networks, might become targets for cyberattacks. Securing these devices and implementing strong network protocols is imperative. Especially to prevent large-scale attacks. Ensure your business has a robust mobile device management strategy. Mobile is taking over much of the workload Organizations should properly track and manage how these devices access business data. Quantum Computing Vulnerabilities Quantum computing, the herald of unprecedented computational power, also poses a threat. Its immense processing capabilities could crack currently secure encryption methods. Hackers might exploit this power to access sensitive data. This emphasizes the need for quantum-resistant encryption techniques to safeguard digital information. Artificial Intelligence (AI) Manipulation AI, while transformative, can (and is) being used to facilitate the spread of misinformation. Cyber criminals are already creating convincing deepfakes with AI, and automating phishing attacks. Vigilance is essential as AI-driven threats become more sophisticated. It demands robust detection mechanisms to discern genuine from malicious AI-generated content. Regulatory bodies and watchdog groups have proposed mandatory watermarks for AI generated content to make it easily discernible from human-generated (or human-reviewed) content. Augmented Reality (AR) and Virtual Reality (VR) Exploits AR and VR technologies offer immersive experiences. But they also present new vulnerabilities. Cybercriminals might exploit these platforms to deceive users, leading to real-world consequences. Ensuring the security of AR and VR applications is crucial. Especially to prevent user manipulation and privacy breaches. This is very true in sectors like gaming, education, and healthcare. Ransomware Evolves Ransomware attacks have evolved beyond simple data encryption. Threat actors now use double extortion tactics. They steal sensitive data before encrypting files. If victims refuse to pay, hackers leak or sell this data, causing reputational damage. Some defenses against this evolved ransomware threat include: Robust backup solutions Regular cybersecurity training Proactive threat hunting Supply Chain Attacks Persist Supply chain attacks remain a persistent threat. Cybercriminals infiltrate third-party vendors or software providers to compromise larger targets. Strengthening supply chain cybersecurity is critical in preventing cascading cyber incidents. Businesses can do this through rigorous vendor assessments, multi-factor authentication, and continuous monitoring. Biometric Data Vulnerability Biometric authentication methods, such as fingerprint or facial recognition, are becoming commonplace. But users can't change biometric data once compromised, like they can passwords. Protect biometric data through secure encryption. Ensure that service providers follow strict privacy regulations. These are paramount to preventing identity theft and fraud. Advanced Phishing Attacks Phishing attacks are one of the oldest and most common forms of cyberattacks. These attacks are becoming more sophisticated and targeted thanks to AI. For example, hackers customize spear phishing attacks to a specific individual or organization. Hackers do this based on online personal or professional information. Another example is vishing attacks. These use voice calls or voice assistants to impersonate legitimate entities, convincingly persuading victims to take certain actions. Ongoing employee phishing training is vital, as well as automated solutions to detect and defend against phishing threats. At Geeks for Business, we believe that a proactive approach to cybersecurity is critical. With our trusted cybersecurity partner, Huntress, we are able to hunt for threats within networks before they become breaches. With complexity in cyberattacks rising, reacting to an attack just isn't enough; our 24/7 managed endpoint detection and response approach allows us to go on the offense against prospective cyber criminals. Tips for Defending Against These Threats As technology evolves, so do the threats that we face. Thus, it’s important to be vigilant and proactive. Here are some tips that can help: Educate yourself and others about the latest technology threats. Use strong passwords and multi-factor authentication for all online accounts. Update your software and devices regularly to fix any security vulnerabilities. Avoid clicking on suspicious links or attachments in emails or messages. Verify the identity and legitimacy of any callers or senders. Do this before providing any information or taking any actions. Back up your data regularly to prevent data loss in case of a cyberattack. Invest in a reliable cyber insurance policy. One that covers your specific needs and risks. Report any suspicious or malicious activity to the relevant authorities. Need Help Ensuring Your Cybersecurity is Ready for 2024? Last year’s solutions might not be enough to protect against this year’s threats. Don’t leave your security at risk. We help small and medium businesses throughout Central North Carolina manage their IT, reduce costs and complexity, expose vulnerabilities, and secure critical business assets. Reach out to Geeks for Business today to schedule a chat. Article used with permission from The Technology Press.
Other Pages (21)
- Causes | Geeks for Business
Causes we care about Causes We Support It's no secret: our environment is in dire shape. Pollinators are facing population collapse, fossil fuel pollution continues to propel global climate change, biodiversity and wild areas are under growing assault from human interests. Likewise, vulnerable populations of humans and animals face ever-mounting challenges to lives with dignity and purpose. This is why we feel it's important to be candid about social and environmental causes we support in our area. We want to encourage everyone, client or not, to dedicate some of your time to help the organizations below. info@leaflimb.com 919-787-9551 www.leaflimb.com Donate to Project Pando Project Pando (by Leaf & Limb ) Leaf & Limb, based in Raleigh, NC, describes their vision: "Increase the health and population of trees to help address pressing environmental issues and restore the balance of life on Earth." Project Pando seeks to connect people with trees, providing native trees to any person or organization who needs them. Their goals of outreach, education, and environmental restoration are goals we deeply and actively support. Keep Durham Beautiful Keep Durham Beautiful is a Durham, NC based nonprofit that we want more people to know about. Their work in removing waste from outdoor spaces, establishing community gardens, and restoring our local environment is critically important and more needed than ever. Geeks for Business has worked with Keep Durham Beautiful to plant trees, shrubs, and bulbs in public spaces and at our offices, in addition to volunteering our time to assist in their regular waste cleanup efforts. info@keepdurhambeautiful.org 919-354-2729 www.keepdurhambeautiful.org Donate to Keep Durham Beautiful The Eno River Association Established in 1966, the Eno River Association is an accredited land trust and conservation nonprofit driven by a mission to conserve and protect the natural, historical, and cultural resources of the Eno River Basin. 4404 Guess Rd. Durham, NC 27712 (919) 620-9099 www.enoriver.org Donate to the Eno River Association Independent Animal Rescue "Independent Animal Rescue is a non-profit group in the Triangle region of North Carolina that works to provide homes for hundreds of unwanted cats and dogs each year. IAR is run primarily by committed individuals from the community who volunteer their time to help homeless animals and to keep our support programs functioning. To learn more about how you can help, visit our Volunteer page." Mail: IAR, P.O. Box 14232, Durham, NC 27709-4232 919-403-2221 www.animalrescue.net Donate to Independent Animal Rescue
- Data and Privacy - Geeks for Business
Learn about the ways we protect your personal information and sensitive data. Data & Privacy Information we collect Information collected via technology Children's privacy (COPPA) Ways we use and share information SMS opt-in, opt-out, and consent How we protect information Personal information rights Your right to be forgotten Links to other websites Changes to our privacy policy Contact us Data and Privacy Data we collect and the way we use it: Geeks for Business LLC (the “Company”) is committed to maintaining robust privacy protections for its users. Our Privacy Policy (“Privacy Policy”) is designed to help you understand how we collect, use and safeguard the information you provide to us and to assist you in making informed decisions when using our Service. For purposes of this Agreement, “Site” refers to the Company’s website, which can be accessed at www.geeksforbusiness.net . “Service” refers to the Company’s services accessed via the Site, in which users can read about our scope of service, general pricing, frequently-asked questions, et cetera. The terms “we,” “us,” and “our” refer to the Company. “You” refers to you, as a user of our Site or our Service. By accessing our Site or our Service, you accept our Privacy Policy and Terms of Use, and you consent to our collection, storage, use and disclosure of your Personal Information as described in this Privacy Policy. This document may be updated at any time, with or without prior written notice. We make every effort to ensure the information contained within is accurate while providing clients with a minimum of 30 days’ notice in the event of changes to our Terms of Service, Privacy Policy, or other Company policies and terms. INFORMATION WE COLLECT: We collect “Non-Personal Information” and “Personal Information.” Non-Personal Information includes information that cannot be used to personally identify you, such as anonymous usage data, general demographic information we may collect, referring/exit pages and URLs, platform types, preferences you submit and preferences that are generated based on the data you submit and number of clicks. Personal Information includes your email address(es), your business(es)’ physical and mailing locations, personal and/or business cellular telephone numbers, IP (Internet Protocol) addresses, software licensing information (eg: Windows licensing information), hardware serial numbers (in the event of new products provided by Geeks for Business LLC within the scope of a technology systems installation, or when such is gathered during a technology systems audit, also referred to as an ‘IT audit’), which you submit to us through the registration process at the Site. I. Information collected via Technology To use our website, hereafter referred to as “the Service”, you do not need to submit any Personal Information other than your email address. To use the Service thereafter, you do not need to submit further Personal Information. Ia. However, in an effort to improve the quality of the Service, we track information provided to us by your browser or by our software application when you view or use the Service, such as the website you came from (known as the “referring URL”), the type of browser you use, the device from which you connected to the Service, the time and date of access, and other information that does not personally identify you. Ib. We track this information using cookies, or small text files which include an anonymous unique identifier. Cookies are sent to a user’s browser from our servers and are stored on the user’s computer hard drive. Sending a cookie to a user’s browser enables us to collect Non-Personal information about that user and keep a record of the user’s preferences when utilizing our services, both on an individual and aggregate basis. Ic. For example, the Company may use cookies to collect the following information: · Referring URL, user agent ID (browser identification), time and date of access, operating system version when accessing our resources, and analytics/performance information The Company may use both persistent and session cookies; persistent cookies remain on your computer after you close your session and until you delete them, while session cookies expire when you close your browser. Id. For example, we store a persistent cookie to track user preferences, sign-in information (if so desired), and other user-selected settings. Persistent cookies are stored on your device and may be deleted at any time, by way of your browser’s settings menu. II. Information you provide us by registering for an account In addition to the information provided automatically by your browser when you visit the Site, to become a subscriber to the Service you will need to create a personal profile. You can create a profile by registering with the Service and entering your email address, and creating a user name and a password. IIa. By registering an account with Us, on this website, you are authorizing us to collect, store and use your email address in accordance with this Privacy Policy. IIb. Children’s Privacy (Compliance with COPPA ) The Site and the Service are not directed to anyone under the age of 13. The Site does not knowingly collect or solicit information from anyone under the age of 13, or allow anyone under the age of 13 to sign up for the Service. In the event that we learn that we have gathered personal information from anyone under the age of 13 without the consent of a parent or guardian, we will delete that information as soon as possible. If you believe we have collected such information, please contact us at support@geeksforbusiness.net III. WAYS WE USE AND SHARE INFORMATION Personal Information: Except as otherwise stated in this Privacy Policy, we do not sell, trade, rent or otherwise share for marketing purposes your Personal Information with third parties without your consent. We do share Personal Information with vendors who are performing services for the Company, such as the servers for our email communications who are provided access to users’ email addresses for purposes of sending emails from us. Those vendors use your Personal Information only at our direction and in accordance with our Privacy Policy. IIIa. In general, the Personal Information you provide to us is used to help us communicate with you. For example, we use Personal Information to contact users in response to questions, solicit feedback from users, provide technical support, and inform users about promotional offers. We may share Personal Information with outside parties if we have a good-faith belief that access, use, preservation or disclosure of the information is reasonably necessary to meet any applicable legal process or enforceable governmental request; to enforce applicable Terms of Service, including investigation of potential violations; address fraud, security or technical concerns; or to protect against harm to the rights, property, or safety of our users or the public as required or permitted by law. IIIb. Non-Personal Information: In general, we use Non-Personal Information to help us improve the Service and customize the user experience. We also aggregate Non-Personal Information in order to track trends and analyze use patterns on the Site. This Privacy Policy does not limit in any way our use or disclosure of Non-Personal Information and we reserve the right to use and disclose such Non-Personal Information to our partners, advertisers and other third parties at our discretion. IIIc. In the event that the company undergoes a restructuring event such as a merger, acquisition by another company, or sale of all or a portion of our assets, your personally identifiable information (PII) may be among the assets transferred. You acknowledge and consent that such transfers may occur and are permitted by this Privacy Policy, and that any acquirer of our assets may continue to process your PII as set forth in this Privacy Policy. If our information practices change at any time in the future, we will post the policy changes to the Site so that you may opt out of the new information practices. We suggest that you check the Site periodically if you are concerned about how your information is used. IIId. SMS/text messaging opt-in, opt-out, and consent When you submit a request for service or pricing through the Contact Us form located in the Site's footer, you will be required to consent to be contacted by Us ("Geeks for Business LLC") by email, phone, and/or SMS in order to proceed. This "opt-in" to be contacted by email, phone, and/or SMS is a regulatory requirement and lets us ensure that your consent to be contacted is appropriately collected and stored in accordance with those regulatory guidelines. Should you wish to opt out of future SMS communications from Us ("Geeks for Business LLC"), you may reply "STOP" to 919-381-8974 at any time. However, to facilitate efficient service, we request that you maintain a valid phone number or email address through which you can be reached about service requests and other service-related updates. You will never be sent marketing or promotional information by SMS from Us ("Geeks for Business LLC"). IV. HOW WE PROTECT INFORMATION Pertaining to our website and other web services: We implement security measures designed to protect your information from unauthorized access. Your account is protected by your account password and we urge you to take steps to keep your personal information safe by not disclosing your password and by logging out of your account after each use. We further protect your information from potential security breaches by implementing certain technological security measures including encryption, firewalls and secure socket layer technology. However, these measures do not guarantee that your information will not be accessed, disclosed, altered or destroyed by breach of such firewalls and secure server software. By using our Service, you acknowledge that you understand and agree to assume these risks. It is incumbent upon each client to perform their own due diligence in implementing security 'best practices' while using any online or digital platform. IVa. Pertaining to on-site, remote, and other contract, maintenance, or retainer work provided by the Company: No user data are stored unless the customer requests that it is stored. All data that are stored are protected by security best practices, including secure passwords (longer than 16 alphanumeric characters, randomly generated), software and hardware encryption, multifactor authentication, virtualization/isolation, and physical security measures including locking any customer equipment that contains user data (personally identifiable information) and/or has otherwise not been formatted or sanitized. IVb. In the event that factors outside of the Company’s control, such as a website or web service hack or data breach, compromise a customer’s personally identifiable information, the Company assumes no legal responsibility for identity theft, fraud, unauthorized financial transactions, or other issues arising from said factors. We ask that you understand that we cannot control the practices of upstream service providers or vendors. We work diligently to protect your data and will not work with software or hardware vendors whose track records for protecting user data is poor. IVc. Geeks for Business uses remote monitoring and management tools, which enables remote, persistent access to end user systems and networks. This technology facilitates connections from us (Geeks for Business), to you, the customer. Each of these remote support sessions is encrypted and access to an end user's system(s) is revocable at any time, should the customer request revocation of this access. Geeks for Business cannot provide remote support services should a customer deny or revoke access to our remote monitoring and management platform. V. YOUR RIGHTS REGARDING THE USE OF YOUR PERSONAL INFORMATION You have the right at any time to prevent us from contacting you for marketing purposes. When we send a promotional communication to a user, the user can opt out of further promotional communications by following the unsubscribe instructions provided in each promotional e-mail. By default, marketing and promotional emails are "opt-in", meaning you don't need to opt-out of them as a matter of course. Please note that notwithstanding the promotional preferences you indicate by either unsubscribing or opting out, we may continue to send you administrative emails including, for example, periodic updates to our Privacy Policy. You agree to accept all emails or other electronic communication regarding your account(s), service(s), contract(s), billing, and other pertinent information when you initiate service with Us. Va. YOUR RIGHT TO BE FORGOTTEN If, during or after any interaction with Geeks for Business in which personally identifiable information (PII) is collected about the Client and the Client wishes to have this information erased from Geeks for Business's customer database, please submit your request to Matt at matt@geeksforbusiness.net . Any personally identifiable information, such as full name, address, phone number, email address, date of birth, and/or any billing information, will be deleted within 3 business days. Geeks for Business will provide an emailed receipt of any data collected that has been removed from our systems. Your right to control your personal information is important to us. VI. LINKS TO OTHER WEBSITES As part of the Service, we may provide links to or compatibility with other websites or applications. However, we are not responsible for the privacy practices employed by those websites or the information or content they contain. This Privacy Policy applies solely to information collected by us through the Site and the Service. Therefore, this Privacy Policy does not apply to your use of a third party website accessed by selecting a link on our Site or via our Service. To the extent that you access or use the Service through or on another website or application, then the privacy policy of that other website or application will apply to your access or use of that site or application. We encourage our users to read the privacy statements of other websites before proceeding to use them. VII. CHANGES TO OUR PRIVACY POLICY The Company reserves the right to change this policy and our Terms of Service at any time. We will notify you of significant changes to our Privacy Policy by sending a notice to the primary email address specified in your account or by placing a prominent notice on our site. Significant changes will go into effect 30 days following such notification. Non-material changes or clarifications will take effect immediately. You should periodically check the Site and this privacy page for updates. VIII. CONTACT US If you have any questions regarding this Privacy Policy or the practices of this Site, please contact us by sending an email to support@geeksforbusiness.net . Last Updated: This Privacy Policy was last updated on 04/01/2025 Information we collect Information collected via technology Children's privacy (COPPA) Ways we use and share information SMS opt-in, opt-out, and consent How we protect information Personal information rights Your right to be forgotten Links to other websites Changes to our privacy policy Contact us
- Managed cloud solutions - Geeks for Business
Geeks for Business provides a powerful cloud management platform, protecting data, apps, and identities Secure Cloud Solutions Geeks for Business is proud to leverage cost-effective and industry-leading cloud IT solutions to simplify your daily business operations, improve user experiences, secure your workloads and identities, and strengthen cybersecurity posture. We can help you slash hardware costs, simplify daily operations, and supercharge your productivity by harnessing the power of cloud technology from leaders like Amazon Web Services and Microsoft Azure. Are your on-premises servers becoming a costly and complex burden? Reach out to Geeks for Business, and we’ll create a tailored plan to virtualize your hardware or shift your tech solutions entirely to the cloud. If your business handles sensitive data, large volumes of information, or demands close-to-the-metal performance, a hybrid-cloud solution can improve productivity, reduce friction, and result in measurable cost savings. With a hybrid approach, we can seamlessly migrate certain tasks to the cloud while keeping critical functions onsite for optimal performance. Ready to optimize your current cloud spending and service engagements? Thinking of repatriating existing cloud services? We've got you covered. With our industry partners, we save clients up to 57% on their annual cloud spending (as of mid-2025). Working with prominent business-focused IT vendors, we can assess your needs and often lower your SaaS spend. Geeks for Business is proud to offer secure, enterprise-grade data backup services through our partners, Veeam and Wasabi Contact us today to explore your cloud storage options and discover how we can enhance your business's uptime and resilience with our secure solutions.







