301-571-5040    Get SUPPORT

Washington Works Blog

Washington Works has been serving the Bethesda area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

An Experienced Endorsement for Testing Backups

An Experienced Endorsement for Testing Backups

Just because you think that you’re following best practices, doesn’t necessarily mean that you actually are. Take it from this aspiring entrepreneur, who shared his own personal experience with us, so you could benefit:

0 Comments
Continue reading

Learn Why Backups are Most Crucial to Users

Learn Why Backups are Most Crucial to Users

Data loss is no joke - and we’ve heard plenty of stories from people who have experienced it firsthand, when personal or business data was lost. We appreciate everyone who shared their experiences with us, and allowed us to post them here. First, we’ll tell the story of someone who learned something in college that wasn’t in the syllabus.

Don’t forget to share your own stories with us in the comments!

0 Comments
Continue reading

4 Timeless Cybersecurity Rules to Live By

4 Timeless Cybersecurity Rules to Live By

Cybersecurity has become an overly complicated, increasingly important part of our lives. These days, many people are concerned about their privacy; who is collecting their data, what data is being collected, how to prevent information from being stolen, how to prevent breaches, etc. Then there are the traditional threats like malware, ransomware, and phishing that are not only becoming more common place but are capable of doing more damage. 

0 Comments
Continue reading

Tech Term: Uptime

Tech Term: Uptime

In managing business technology, we are always talking about downtime--how expensive downtime is, how downtime hurts productivity, how there are a multitude of separate situations that can cause downtime. That kind of doom and gloom may not get you to act, but it may just put you off. Today, instead of downtime, we thought we would talk about uptime. 

0 Comments
Continue reading

A Brief Review of Backup Strategies

A Brief Review of Backup Strategies

For the modern business, not having a backup system in place is inexcusable. If you use digital data to run your business, you need to protect the data you can’t replace by having it backed up regularly. Some businesses have been around long enough to have files that don’t have any practical application in the course of business. You don’t need this data, and you don’t need a copy of it. Today, we will discuss how to select and choose which pieces of data you should seek to protect. 

0 Comments
Continue reading

Tip: Control File Sharing for Employees in Microsoft OneDrive

Tip: Control File Sharing for Employees in Microsoft OneDrive

If your business uses Office 365, your users get access to OneDrive, Microsoft’s cloud storage. Your employees can upload, sync, and share documents to collaborate with colleagues. This can be a good thing, but you may want to control how employees are sharing company documents. 

0 Comments
Continue reading

Tip of the Week: Managing Your IT Inventory Management

Tip of the Week: Managing Your IT Inventory Management

IT inventory management is the process of making sure that your information technology resources are maintained to be their most effective, such as what needs to be updated, which licenses need to be renewed, and whether your resources are helping you accomplish your organizational goals. It is essentially a fancy way of saying asset management, specific to your IT - and it is a very important process for any business.

0 Comments
Continue reading

Google Password Checkup Tool Works to Keep You Secure

Google Password Checkup Tool Works to Keep You Secure

Imagine a world where there wasn’t a singular dishonest being. Passwords would simply vanish from our everyday lives, as we would not be paranoid of a breach or other forms of cybercriminal activity. The harsh reality is this will never become reality. Even worse, the cybercriminals don’t just skim for lack of passwords. Instead, the dishonest criminal goes even further; they take advantage of common or recurring passwords. So how do you know if your password practices are leaving you vulnerable? Google is here to help. 

0 Comments
Continue reading

Getting Your iMessages on Windows 10

Getting Your iMessages on Windows 10

Just a short time ago, applications were very specific to the type of devices they could be used on. Today, software communicates in a way that has transformed the usability of our apps. One of the most useful examples, are the expansions on messaging. Messaging no longer means cellphone-to-cellphone, or computer-to-computer. Today, we take a look at how you can utilize the iMessage application’s versatility, by getting it on your Windows 10 PC. 

0 Comments
Continue reading

Tip of the Week: How to Automate Sorting Your Emails

Tip of the Week: How to Automate Sorting Your Emails

Emails are a wonderfully useful solution, and quite possibly one of the most commonly used ones in the workplace today. However, not everyone is using every capability that their email solutions offer - and it has led to a lot of time being wasted in the workplace. For this week’s tip, we’ll review how to help cut back on the time spent organizing your emails.

0 Comments
Continue reading