Shauli Zacks
Updated on: September 18, 2025
SafetyDetectives recently interviewed Scott St. Gelais, founder of Geeks in Phoenix (GIP). With a career that began in the early 1990s and a passion sparked by his very first computer, Scott has built a reputation for expertise in computer repair, virus removal, and data recovery. Drawing from over a decade in IT management and nearly twenty-five years of consulting experience, he’s seen firsthand how everyday mistakes can leave individuals and businesses vulnerable to cyber threats. In this interview, Scott shares his journey into tech repair, insights on the most common security pitfalls, and practical advice for staying safe in an increasingly digital world.
Hi Scott, can you tell us about your journey into tech repair: what first drew you to work in computer repair, virus removal, and data recovery, and how has that shaped what you believe about online safety?
My journey into tech repair began in the early 1990s, when I returned to school to study Computer-Aided Drafting (CAD). It was during this time that I got my first computer—a 286 running DOS 5 and Windows 3.1. This experience was transformative for me; I quickly developed a passion for technology that has shaped my career ever since. By the time I completed my studies, I had set up a token-ring network, which further fueled my interest in computers.
After working as a system administrator and IT manager in the architectural community for over thirteen years, I began offering IT consulting services in my spare time around 2001. I was drawn to computer repair, virus removal, and data recovery because I witnessed firsthand the critical importance of these services for individuals and businesses. Each time I helped someone recover lost data or eliminate a damaging virus, it reinforced my belief in the importance of online safety and security.
This journey has taught me that in our increasingly digital world, protecting information is essential. Every day, I strive to help my clients not only recover but also protect their data, ensuring they have the tools and knowledge to stay safe online. My commitment to clients’ satisfaction and my growing expertise continually motivate me to stay ahead in this ever-evolving tech landscape.
From your experience in hands-on repair work, what are some of the most common security vulnerabilities you see in everyday computers or users? What mistakes do people keep making?
From my hands-on experience in IT consulting and computer repair, I’ve observed several common security vulnerabilities that everyday users often overlook. One of the most prevalent issues is the lack of regular software updates. Many users either ignore system notifications or turn off automatic updates, leaving their devices vulnerable to known security vulnerabilities that could be easily patched.
Another frequent mistake is poor password management. Many people use weak or easily guessable passwords and reuse them across multiple accounts, which dramatically increases their risk if one account is compromised. This can be easily mitigated by using strong, unique passwords for each account and employing password managers to keep track of them.
Phishing attacks also pose a significant threat. Users often fail to recognize suspicious emails or messages, leading them to click on harmful links or download malicious attachments. I frequently remind clients to be cautious and verify the source of any unexpected communication before engaging with it.
Additionally, many individuals overlook the importance of using antivirus software and firewalls. Some believe that simply having these tools installed is enough, but they need to be regularly updated and properly configured to provide effective protection.
Overall, these mistakes stem from a lack of awareness and education about cybersecurity best practices. By addressing these vulnerabilities and implementing more robust security measures, users can significantly reduce their risk of falling victim to cyber threats.
When someone brings in an infected or compromised computer, how do you balance restoring function vs preserving the privacy and security of their data? What practices do you follow to ensure trust?
When a client brings in an infected or compromised computer, my approach focuses on both restoring functionality and preserving the privacy and security of their data. I understand that data is often more valuable than hardware, and I prioritize maintaining client trust throughout the process.
First, I conduct a thorough assessment of the computer to identify the type of infection or compromise that has occurred. I inform the client about potential risks, and we discuss the best course of action together. Before taking any steps, I always ensure that I have the client’s consent, especially if data recovery or backups are necessary.
To manage their data securely, I follow strict protocols:
- I create a secure backup of critical data before any repair work begins. This helps prevent data loss during the restoration process.
- I maintain a high standard of confidentiality, ensuring that any sensitive information on the device remains protected. I do not access or review personal data beyond what’s necessary for repair.
- I utilize reputable software and tools for virus removal and data recovery, which are recognized for their effectiveness and respect for user privacy.
- I keep my clients informed at every step of the process and explain any actions I take to ensure transparency. This transparency fosters trust and allows clients to understand how their data is being handled.
- Once the repair is complete, I provide clients with steps to enhance their security and prevent future infections, ensuring they feel empowered in their digital safety.
By combining technical expertise with a strong emphasis on privacy and open communication, I strive to create a trusted environment where clients feel secure in the care of their devices.
With more people working from home, using personal devices for business, etc., how has the demand or nature of security threats shifted from your point of view?
From my perspective, the shift towards a remote work culture and the increased use of personal devices for business have significantly evolved the landscape of security threats. As more individuals utilize their own devices, the line between personal and professional data becomes blurred. This situation creates unique vulnerabilities, as personal devices may lack the robust security measures typically implemented in corporate environments.
I’ve noticed an increase in threats, such as phishing attacks and malware, particularly as cybercriminals capitalize on the widespread transition to remote work. Employees may be more susceptible to these threats due to the informal nature of their home networks and a general lack of awareness around security protocols.
Furthermore, there’s been a rise in the need for comprehensive security solutions tailored to remote setups. This includes not only antivirus and anti-malware software but also virtual private networks (VPNs) and advanced firewalls to safeguard sensitive information. As a consultant, I’ve had to adapt my approach, focusing more on educating clients about these risks and implementing solutions that can protect them while they work from home. Overall, the demand for personalized IT support and security measures has never been greater, and staying ahead of these evolving threat landscapes has become a central focus for my firm, Geeks in Phoenix.
What advice would you give to users (and small businesses) who want to prevent infections, data loss, or other security issues – especially people who might not be tech-savvy or have large budgets?
When it comes to preventing infections, data loss, and other security issues, especially for users and small businesses on a tight budget or those who may not be tech-savvy, there are several key steps you can take:
- Always ensure your operating system and software applications are up to date. Many updates include critical security patches that protect against vulnerabilities.
- Invest in reliable antivirus software that provides real-time protection. Many reputable programs offer free versions that can significantly reduce the risk of malware infections.
- Regular backups are crucial. Utilize both cloud services and external hard drives to ensure your data remains secure. Automate backups if possible, so you don’t forget.
- Take some time to learn about common security threats such as phishing scams and malware. Simple training sessions can help everyone recognize suspicious emails or links.
- Use strong, unique passwords for different accounts and enable two-factor authentication wherever possible. A password manager can help you keep track of all your passwords securely.
- Always change the default passwords on your router and other devices. Consider setting up a guest network to keep your main network secure for visitors.
- Avoid accessing sensitive information or conducting important business using public Wi-Fi unless you’re using a virtual private network (VPN) to secure your connection.
- For businesses, ensure that employees only have access to the information and systems necessary for their roles. This minimizes the risk of data breaches.
By implementing these practices, you can significantly enhance your security posture without requiring extensive technical knowledge or a large budget. Remember, a proactive approach to security is always more effective than trying to recover from an incident that has already occurred.
Looking ahead, what developments in cyber threats or repair technology are you watching closely, and how is Geeks in Phoenix preparing to adapt or help protect customers?
Looking ahead, I’m closely monitoring several developments in cyber threats and repair technology. One area of concern is the increasing sophistication of ransomware attacks, which are targeting businesses of all sizes. Additionally, the rise of Internet of Things (IoT) devices introduces new vulnerabilities that could be exploited if not properly secured.
To prepare for these evolving threats, Geeks in Phoenix is proactively enhancing its cybersecurity measures by staying up-to-date with the latest industry trends and participating in ongoing education opportunities. My recent completion of the IT Support Professional Certificate from Google has further equipped me to address these challenges.
We’re also expanding our services to include comprehensive security assessments for clients, helping them identify and mitigate potential risks in their IT environments. This includes educating customers on best practices for cybersecurity and offering solutions to protect their networks and data efficiently. Our goal is to ensure our clients not only feel secure but are resilient against emerging threats as technology continues to evolve.