301-571-5040    Get SUPPORT

Washington Works Blog

Washington Works has been serving the Bethesda area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Washington Works has been serving the Bethesda area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Use this Free PC Tool to Find Out Which Files You Should Delete Next

Tip of the Week: Use this Free PC Tool to Find Out Which Files You Should Delete Next

Fact: your PC has a limited amount of storage space. When a user runs out of space or comes close to it, they need to come up with a solution. Without taking any action, performance will lag and saving data for future projects will be impossible. By using a helpful tool like WinDirStat, you can free up space by easily identifying and then taking action with your PC’s biggest files.

0 Comments
Continue reading

Would You Rather: Maintain Your Technology, or Accomplish a Business Goal?

Would You Rather: Maintain Your Technology, or Accomplish a Business Goal?

How much time does your business waste on managing its own technology services? This includes maintaining your email solution, upgrading and managing your desktop infrastructure, and keeping your network secure from both internal and external threats. We would understand if you said that you don’t have time to both run your business and its technology, but we are of the firm belief that you shouldn’t have to choose one over the other.

0 Comments
Continue reading

Here’s Why Solid State Drives are Way Better Than Traditional Hard Disk Drives

Here’s Why Solid State Drives are Way Better Than Traditional Hard Disk Drives

Your business has plenty of choices for data storage, but there are few options better suited for business environments than the solid state drive. Even though the hard disk drive is more common, the solid state drive offers many benefits that your organization cannot dismiss--certainly not if you want to seize all possible opportunities.

1 Comment
Continue reading

Tip of the Week: How to Calculate Basic Math Problems Using Microsoft Word

Tip of the Week: How to Calculate Basic Math Problems Using Microsoft Word

You know Microsoft Word as the great word processor that your business relies on to compose documents of all kinds. However, Microsoft Word is much more flexible and versatile than you might think. Did you know that you can perform simple calculations in your Microsoft Word document in a quick and efficient way?

0 Comments
Continue reading

ALERT: Massive Ransomware Attack is the Biggest Ever

ALERT: Massive Ransomware Attack is the Biggest Ever

Run your Windows Updates and be very skeptical about opening unsolicited emails. Failure to do so may result in a very dangerous strain of ransomware that could infect your entire network and spread to your clients, partners, and prospects.

0 Comments
Continue reading

Getting Greedy: Ransomware Hackers are Asking for Way More Money

Getting Greedy: Ransomware Hackers are Asking for Way More Money

If fiscal reasons have stopped you from securing your network against ransomware thus far, you may want to reconsider your strategy. Not only are attacks still becoming more and more prevalent, but the developers of ransomware have lowered the price of admission for aspiring cyber criminals. Fortunately, there are some steps you can take to keep your business protected against a ransomware attack.

0 Comments
Continue reading

You Need More Than a Power Strip to Protect Your Company’s Equipment

You Need More Than a Power Strip to Protect Your Company’s Equipment

What would happen if you were in the middle of typing a report or performing some task, and the office suddenly lost power? Too many would find themselves staring blankly at an equally blank screen as their infrastructure suddenly ceased operations. However, there is a device that can help save you from the worst effects of sudden power loss.

0 Comments
Continue reading

Tip of the Week: How to Plan Your Network’s Cabling Like an IT Pro

Tip of the Week: How to Plan Your Network’s Cabling Like an IT Pro

A crucial step of setting up your business is the implementation of a physical infrastructure, including cabling and electrical lines. Unfortunately, the same setup won’t work for two very different businesses, so you’ll need to put considerable time and effort into the cabling process as a whole. Here are a few ways that you can make the process easier.

0 Comments
Continue reading

A Look at How Cloud Computing Professionals Can Help Your Business

A Look at How Cloud Computing Professionals Can Help Your Business

When you hear us speak the world “cloud,” it’s not the fluffy white forms soaring overhead. The cloud that we refer to are computing systems that are delivered to you through an Internet connection. The popularity and demand for cloud services has led both ordinary consumers and businesses alike to seek them out. Despite this demand, in the United States alone, there are over 500,000 IT jobs available. This suggests that there may be a shortage of workers with the requisite skillset and can provide a unique incentive to join the industry as to take advantage of such massive growth.

0 Comments
Continue reading

3 Ways Managed IT Keeps Your Business in Business

3 Ways Managed IT Keeps Your Business in Business

In the natural course of doing business, an owner/operator will have to face many difficult situations, but none of these situations are as difficult as asking them to determine whether or not to close the doors of the business for good. Many problems could cause a business to fail, but it has to hurt the failing owner a little more when the solution for the problem was not only within his/her reach, it was affordable.

0 Comments
Continue reading

Warning: Google Docs Hit With Phishing Attack

Warning: Google Docs Hit With Phishing Attack

On Wednesday, several users found themselves the victim of a convincing phishing attack. The attack was designed to look like an invitation to view and edit a Google Doc, and is designed to steal your Google credentials and spread through your contacts.

0 Comments
Continue reading

Tip of the Week: 12 Security Rules Every PC User Should Follow

Tip of the Week: 12 Security Rules Every PC User Should Follow

While you are probably spending a fair amount of time thinking about your business’ security, can you confidently say the same about those that you’ve employed? Unfortunately, your workers may not put much thought into network security. This could very possibly lead to some severe issues potentially harming your business operations.

0 Comments
Continue reading

Next Job on the Automation Chopping Block: Pizza Delivery

Next Job on the Automation Chopping Block: Pizza Delivery

Did you know that over 2,000 Domino’s Pizza franchises in Australia, New Zealand, France, Belgium, The Netherlands, Japan, and Germany feature delivery by robot? Starship Technologies, a self-driving robotics company, announced on March 29th that they would be partnering with Domino’s to revolutionize the way the delivery process works.

Tags:
1 Comment
Continue reading

How Rogue Software Makes PC Problems Worse

How Rogue Software Makes PC Problems Worse

It’s difficult to know what you can and can’t trust in the realm of cybersecurity. However, you’re likely to trust your own security solution. Yet, even this could be a devastating oversight, as some malware masquerades as your security software.

0 Comments
Continue reading

Tip of the Week: Use Windows Start Menu to Search Your PC and the Web

Tip of the Week: Use Windows Start Menu to Search Your PC and the Web

It’s no secret that finding a particular program or file on your computer can be a pain, especially when you don’t have the time to hunt it down by clicking through folders. However, there is a much easier way to locate your desired data. All you need to do is use the search option found in the Start menu, which is the subject of this week’s tip.

0 Comments
Continue reading

How Do You Feel About ISPs Selling Your Internet Browsing History?

How Do You Feel About ISPs Selling Your Internet Browsing History?

In October of 2016, the Federal Communications Commission designed a set of rules known as the Broadband Consumer Privacy Proposal. These rules had intended to flip the status quo and require Internet service providers (ISPs) to gain their customers’ permission before they harvested their browsing histories to sell to advertisers. This proposal is now moot with the establishment of a new law that passed through Congress and was signed by President Trump in April 2017.

0 Comments
Continue reading

The Top 3 Ways Cloud Computing Helps Businesses

The Top 3 Ways Cloud Computing Helps Businesses

Cloud computing has taken the business world by storm, fulfilling so many needs and simplifying as many processes. If you’ve been on the fence about incorporating the cloud into your IT infrastructure, you should know a few of these benefits to help you make your choice.

1 Comment
Continue reading

Tip of the Week: Here’s an Easy Way to Update Your Hardware Drivers in Windows 10

Tip of the Week: Here’s an Easy Way to Update Your Hardware Drivers in Windows 10

The average employee and business owner relies on various hardware solutions to go about their day-to-day duties. These hardware devices--think keyboards, wireless mouses, external microphones, and any USB devices--utilize drivers which allow for inter-device compatibility. What happens when these drivers aren’t installed or kept up to date? Your technology suffers, and so does your productivity.

1 Comment
Continue reading

How a Single Hacker Stole $100 Million From Two Major Tech Companies

How a Single Hacker Stole $100 Million From Two Major Tech Companies

An unfortunate fact about the modern business world is that any organization that utilizes technology is playing with fire. Cyber attacks can circumvent even the most well-protected networks through the company’s users. This is, unfortunately, something that business owners often don’t learn until they’re on the receiving end of an attack; just like the two companies that fell victim to phishing attempts that were supposedly operated by Evaldas Rimasauskas, a Lithuanian hacker who has been accused of stealing $100 million from them.

0 Comments
Continue reading

How Does a UTM Firewall Protect Your Business?

How Does a UTM Firewall Protect Your Business?

Every time you pick up a personal computer from a vendor, chances are that it will have an extremely basic firewall pre-installed. These consumer-grade firewalls leave much to be desired, especially in the business environment. You’ll want to make sure that your organization is equipped with enterprise-level solutions designed to protect on both a fundamental level and an advanced level. To do this, you want to take advantage of a Unified Threat Management solution.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite
Washington Works