301-571-5040    Get SUPPORT

Washington Works Blog

Washington Works has been serving the Bethesda area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Washington Works has been serving the Bethesda area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

Intel recently found itself (once again) in hot water, mere months after many flaws were discovered in the firmware that enables all of their chips to do their job. This time, the issue could have potentially caused a permanent dip in the CPU’s capacity to function properly. This has come to be known as the Meltdown vulnerability.

0 Comments
Continue reading

According to Study, Only 28% Utilize Two-Factor Authentication

According to Study, Only 28% Utilize Two-Factor Authentication

2FA, or two-factor authentication, is a simple and effective means of boosting your cybersecurity. Despite this, a study performed by Duo Labs suggests that 2FA has not been adopted as much as one might expect, or as much as it should be.

0 Comments
Continue reading

Tip of the Week: How to Type Special Symbols

Tip of the Week: How to Type Special Symbols

The Internet has enabled businesses to establish relationships on a global scale. Now, an upscale restaurant in Minneapolis can use the Internet to order ingredients from a vendor in Bordeaux. However, there can easily be a language difference when doing business internationally. This is when it is fortunate that Windows 10 makes it so easy to change your device’s language.

0 Comments
Continue reading

Mobile Security Showdown: Cellular Network vs. Wi-Fi

Mobile Security Showdown: Cellular Network vs. Wi-Fi

Today’s business relies on mobile devices, like smartphones, to guide them to productivity and efficiency. In fact, the vast majority of people in today’s society own a smartphone. A report shows that 90 percent of people younger than 30 own a smartphone, which means that the forward-thinking business hiring talented millennials may want to start thinking about how to secure any mobile devices that they use to access company data.

0 Comments
Continue reading

Hitman Email Scam Threatens Your Life, Instead of Your Data

Hitman Email Scam Threatens Your Life, Instead of Your Data

Email scams have become a sort of punchline, often featuring Nigerian princes or wealthy, unknown relatives in need of funds to get home. However, another email scam is anything but amusing, as it uses a unique possession of the target to entice them to comply: their life.

Tags:
0 Comments
Continue reading

Tip of the Week: Do You Know What Your Android Permissions Actually Mean?

Tip of the Week: Do You Know What Your Android Permissions Actually Mean?

Downloading an application on an Android device is fairly simple: access the Google Play store, find the app you want to download, and press the button that says install. However, it is also too easy to simply hit ‘Allow’ once the app starts asking for ambiguously-worded permissions. Today, we’ll examine what these permissions actually mean.

0 Comments
Continue reading

Why ROBOT is a Risk After Nearly 20 Years

Why ROBOT is a Risk After Nearly 20 Years

The Internet is rife with potential threats. Some are situational, but most are deliberate actions made by malicious entities who are trying to obtain any semblance of value from you or your company. Some of these exploits have been around longer than you’d imagine possible. This has been made evident by huge Internet-based companies such as PayPal and Facebook testing positive for a 19-year-old vulnerability that once allowed hackers to decrypt encrypted data.

0 Comments
Continue reading

Here’s Our Rundown on Blockchain Technology

Here’s Our Rundown on Blockchain Technology

As we discuss business technology, we occasionally broach topics that not everyone may be familiar with. Despite the recent media coverage that has been afforded to it, Bitcoin and blockchain technology may be a good example of one such topic. To resolve this, we’ve put together the following primer on this technology and how it will impact data security in the future.

0 Comments
Continue reading

Tip of the Week: Why You Should Reexamine Your Business Practices

Tip of the Week: Why You Should Reexamine Your Business Practices

As a business adopts certain “best practices,” it is important for business leaders to consider why they are adopted, and more importantly, are they really for the best? There are many problems that subscribing to false best practices can produce, and so it becomes important to identify, adjust, and resolve them.

0 Comments
Continue reading

Technology Has Played a Part in Shaping How We Celebrate the Season

Technology Has Played a Part in Shaping How We Celebrate the Season

The holiday season has always been one of deep-seated traditions, some that draw from ancient customs, and some that are inspired by more contemporary trends. These traditions have been shaped, and often inspired by, the technology available in the day. Today, we’ll reflect on how the technologies we have now have impacted our celebratory traditions.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Cloud Privacy Business Computing Malware Hackers Network Security Business Backup Productivity Microsoft Email User Tips Ransomware Software Smartphone Managed IT Services Office 365 Small Business Windows 10 Internet Android Computer Business Continuity IT Services Mobile Devices Hosted Solutions Efficiency Google Managed Service Provider Remote Monitoring Cloud Computing Smartphones Data Management Hardware Data Recovery Work/Life Balance Browser Workplace Tips Tip of the week Social Media Productivity Outsourced IT Encryption Facebook Phishing Disaster Recovery Risk Management How To Business Management IT Support SaaS Windows Government Cybersecurity Password Apps Windows 10 Big Data Save Money App Holiday Hosted Solution Communication Word Unified Threat Management Money Botnet Office Virtual Reality Automation Saving Money Antivirus Data Backup Managed IT Services Collaboration Twitter Paperless Office Two-factor Authentication Computer Care Bandwidth Maintenance Robot Data BYOD Recovery Training File Sharing Employer-Employee Relationship Innovation Automobile Alert Scam Health Samsung Vulnerability IT Management Mobile Device Computing Wi-Fi Taxes Telephone Systems Politics Virtual Private Network Hacker Artificial Intelligence Firewall Websites Physical Security Digital Meetings Tracking Fraud Customer Relationship Management Mail Merge Techology Access Control VoIP Cyber Monday Bluetooth Hard Disk Drive Administrator Spyware Webcam Document Management Mobile Security Address Unified Threat Management SharePoint Avoiding Downtime Education Machine Learning IT Solutions Black Market Smart Technology Point of Sale Crowdsourcing Hotspot Mobile Device Management User Error Downloads Time Management Cleaning Relocation Upgrades Distributed Denial of Service How To Identity Theft Personal Information Language Update Multi-Factor Security Network Management Private Cloud Downtime Managed IT Service Managed IT Business Technology Analytics Web Server Supercomputer Computing Infrastructure Tech Support Google Calendar Touchscreen IT Support Error Corporate Profile Remote Computing Break Fix Outlook Lenovo Gadgets Chrome Cameras IT Budget Computer Repair Alerts Budget Chromebook Legislation Cabling Communications WannaCry Cybercrime Processors Dark Web Shortcut Superfish Firefox CCTV Digital Payment Law Enforcement Mouse Infrastructure Monitors Staffing Microsoft Excel Upgrade Patch Management Vendor Management Gadget Virtualization Emoji Wireless Tablet Heating/Cooling Disaster Data loss Travel Network Search Internet of Things Networking G Suite Server Electronic Medical Records Comparison Servers Uninterrupted Power Supply YouTube Motion Sickness WiFi Blockchain VPN Data Security Passwords Quick Tips Cortana Legal Specifications Server Management Office Tips Settings GPS Notifications Social Permissions IBM Printer Google Drive IT Consultant Sports Microsoft Office Black Friday Statistics Solid State Drive IP Address Website Customer Service Mobile Office Domains CrashOverride Hard Drives Spam Public Speaking Emergency Lithium-ion battery Augmented Reality Safety The Internet of Things Hiring/Firing Competition Fun Users Licensing Miscellaneous VoIP Presentation 5G Wireless Technology Marketing