301-571-5040    Get SUPPORT

Washington Works Blog

Washington Works has been serving the Bethesda area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why You Need to Be Certain You’re Using Licensed Software

Why You Need to Be Certain You’re Using Licensed Software

Using pirated software or abusing your software licenses for your business is heavily frowned upon. However, many software companies, in an attempt to protect their products, have unleashed a practice that can actually reward those who let it happen in the first place.

0 Comments
Continue reading

Tip of the Week: Putting Your Old Android Device to Good Use

Tip of the Week: Putting Your Old Android Device to Good Use

Considering how often smartphones are replaced, you’re bound to have a couple of them stashed away for a rainy day. These devices are particularly helpful in the event that your smartphone breaks unexpectedly, but there are other purposes that you might want to keep in mind. Here are three ways you might be able to use your old mobile devices around the office.

0 Comments
Continue reading

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

Intel recently found itself (once again) in hot water, mere months after many flaws were discovered in the firmware that enables all of their chips to do their job. This time, the issue could have potentially caused a permanent dip in the CPU’s capacity to function properly. This has come to be known as the Meltdown vulnerability.

0 Comments
Continue reading

According to Study, Only 28% Utilize Two-Factor Authentication

According to Study, Only 28% Utilize Two-Factor Authentication

2FA, or two-factor authentication, is a simple and effective means of boosting your cybersecurity. Despite this, a study performed by Duo Labs suggests that 2FA has not been adopted as much as one might expect, or as much as it should be.

0 Comments
Continue reading

Tip of the Week: How to Type Special Symbols

Tip of the Week: How to Type Special Symbols

The Internet has enabled businesses to establish relationships on a global scale. Now, an upscale restaurant in Minneapolis can use the Internet to order ingredients from a vendor in Bordeaux. However, there can easily be a language difference when doing business internationally. This is when it is fortunate that Windows 10 makes it so easy to change your device’s language.

0 Comments
Continue reading

Mobile Security Showdown: Cellular Network vs. Wi-Fi

Mobile Security Showdown: Cellular Network vs. Wi-Fi

Today’s business relies on mobile devices, like smartphones, to guide them to productivity and efficiency. In fact, the vast majority of people in today’s society own a smartphone. A report shows that 90 percent of people younger than 30 own a smartphone, which means that the forward-thinking business hiring talented millennials may want to start thinking about how to secure any mobile devices that they use to access company data.

0 Comments
Continue reading

Hitman Email Scam Threatens Your Life, Instead of Your Data

Hitman Email Scam Threatens Your Life, Instead of Your Data

Email scams have become a sort of punchline, often featuring Nigerian princes or wealthy, unknown relatives in need of funds to get home. However, another email scam is anything but amusing, as it uses a unique possession of the target to entice them to comply: their life.

Tags:
0 Comments
Continue reading

Tip of the Week: Do You Know What Your Android Permissions Actually Mean?

Tip of the Week: Do You Know What Your Android Permissions Actually Mean?

Downloading an application on an Android device is fairly simple: access the Google Play store, find the app you want to download, and press the button that says install. However, it is also too easy to simply hit ‘Allow’ once the app starts asking for ambiguously-worded permissions. Today, we’ll examine what these permissions actually mean.

0 Comments
Continue reading

Why ROBOT is a Risk After Nearly 20 Years

Why ROBOT is a Risk After Nearly 20 Years

The Internet is rife with potential threats. Some are situational, but most are deliberate actions made by malicious entities who are trying to obtain any semblance of value from you or your company. Some of these exploits have been around longer than you’d imagine possible. This has been made evident by huge Internet-based companies such as PayPal and Facebook testing positive for a 19-year-old vulnerability that once allowed hackers to decrypt encrypted data.

0 Comments
Continue reading

Here’s Our Rundown on Blockchain Technology

Here’s Our Rundown on Blockchain Technology

As we discuss business technology, we occasionally broach topics that not everyone may be familiar with. Despite the recent media coverage that has been afforded to it, Bitcoin and blockchain technology may be a good example of one such topic. To resolve this, we’ve put together the following primer on this technology and how it will impact data security in the future.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Cloud Hackers Privacy Business Computing Malware Network Security Business Backup Productivity Microsoft Software Email Ransomware User Tips Android Smartphone Office 365 Mobile Devices Small Business Windows 10 Internet Managed IT Services Computer IT Services Hosted Solutions Efficiency Google Business Continuity Managed Service Provider Data Recovery Remote Monitoring Smartphones Work/Life Balance Hardware Tip of the week Workplace Tips Outsourced IT Productivity Browser Social Media Encryption Cloud Computing Data Management Business Management SaaS Cybersecurity Government Password Windows 10 Save Money Apps App Holiday Big Data Word Hosted Solution Unified Threat Management Money Phishing Facebook IT Support Disaster Recovery Communication Risk Management How To Windows Managed IT Services Physical Security Hacker Twitter Collaboration Paperless Office Maintenance Office Computer Care Robot BYOD Saving Money Training Recovery File Sharing Two-factor Authentication Bandwidth Data Scam Automobile Alert Vulnerability Health IT Management Mobile Device Samsung Computing Telephone Systems Employer-Employee Relationship Innovation Virtual Private Network Taxes Politics Artificial Intelligence Firewall Websites Botnet Wi-Fi Virtual Reality Automation Antivirus Data Backup Computing Infrastructure Point of Sale Crowdsourcing Cleaning How To Google Calendar Relocation Identity Theft Microsoft Office Customer Relationship Management Network Management Break Fix Alerts Personal Information Managed IT Business Technology Analytics Legislation Private Cloud Supercomputer Update Touchscreen Dark Web Downtime IT Support Outlook Licensing Web Server Corporate Profile IT Solutions Lenovo Chrome Mouse Error IT Budget Microsoft Excel Cabling Remote Computing Shortcut Cameras WannaCry Upgrades Mobile Device Management Computer Repair Chromebook Superfish Firefox Tablet Communications Digital Payment Internet of Things Cybercrime Infrastructure Processors Patch Management CCTV Monitors Law Enforcement Staffing Vendor Management Comparison Blockchain Disaster Tech Support Heating/Cooling Data loss Gadget Network Emoji Networking Specifications Permissions Travel Uninterrupted Power Supply Budget Gadgets Servers VPN G Suite YouTube Printer WiFi Electronic Medical Records Data Security Quick Tips Black Friday Fraud Motion Sickness Server Management Settings Access Control GPS Legal Upgrade Google Drive Cyber Monday Office Tips Mobile Security Solid State Drive Virtualization Notifications Social Statistics Mail Merge IT Consultant Digital SharePoint Tracking Wireless Sports Search Techology VoIP Smart Technology Hotspot Meetings Hard Disk Drive Server Bluetooth Address Spyware Downloads Document Management Unified Threat Management Avoiding Downtime Distributed Denial of Service Administrator Language Webcam Cortana Passwords Education Multi-Factor Security Machine Learning Black Market IBM User Error Time Management Managed IT Service Marketing Emergency IP Address Website Customer Service Mobile Office Domains Hard Drives Spam Cooperation Public Speaking Staff Lithium-ion battery Augmented Reality Safety The Internet of Things Hiring/Firing Competition Fun Users Miscellaneous VoIP Presentation Wireless Technology CrashOverride 5G