Thank You For Visiting

The IT Geeks

We Help You Enjoy Your Technology

Managed Services


Managed IT Services

The IT Geeks’ Essentials IT Services give you the IT service your business needs, for an affordable price with no contracts or cancellation fees.
The IT Geeks provides top notch IT support in the Bakersfield and surrounding areas. Our Technicians are certified, professional, and friendly.

Home Office Essentials
Lorem ipsum dolor sit amet consectetur adipiscing elit dolor
Small Business Essentials
Lorem ipsum dolor sit amet consectetur adipiscing elit dolor
Enterprise Essentials
Lorem ipsum dolor sit amet consectetur adipiscing elit dolor


The IT Geeks provides onsite and remote repair services such as:

  • Basic Break/Fix PC Repair
  • Email Protection
  • Virus/Threat Removal
  • Firewall Design and Security
  • Upgrades and Deployments
  • Server Troubleshooting and Repair
  • Networking Services
  • Website Design
  • E-Commerce
  • Cloud Services
  • Network Assessment and Analysis
  • Security Risk Evaluations
  • Business Disaster Recovery

Network Assessment

Risk Assessment

Risk assessments are not only vital, but also government-mandated for organizations that store sensitive information and data, such as medical, law enforcement, financial and commercial-oriented organizations who maintain private, personal information whose data loss could compromise their confidentiality, integrity and assets.

Vulnerability Management

Vulnerability management programs are the meat and potatoes of every comprehensive information security program. They are not optional anymore. If you’re still thinking about a vulnerability management policy as a tactical operations tool to use, occasionally there are a lot of good reasons to reconsider. It should be one of the cornerstones of your security program.

Malware Remediation

Because today’s malware uses multiple vectors to spread including infecting file shares and brute-forcing weak passwords, organizations need to implement comprehensive information security policies and procedures that address all areas of potential compromise and vectors of attack. Protecting your organization from these growing threats requires multiple layers of defenses.

Stay in Touch

I am text block. Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. 

Copyright 2021 © All rights Reserved. The IT Geeks.