301-571-5040    Get SUPPORT

Washington Works Blog

Washington Works has been serving the Bethesda area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Washington Works has been serving the Bethesda area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 3 Ways to Get Your IT Budget Under Control

Tip of the Week: 3 Ways to Get Your IT Budget Under Control

When you’re planning your business’s technology ventures, how often does your IT budget become a major deciding factor? Chances are that it clings to you like a ball and chain. Wouldn’t it be nice to free yourself from something so limiting? We’ve compiled three ways that you can take some of the strain off of your IT budget.

0 Comments
Continue reading

Collecting Data is Easy, Using it to Benefit Your Business is the Challenge

Collecting Data is Easy, Using it to Benefit Your Business is the Challenge

Big data is a trend that’s gaining traction in the business environment. By taking a close look at the data that you collect, and identifying trends, you can potentially predict how your business can perform, and how your clients will respond to your products or services. Yet, there are two major questions that you need to ask: how are you going to use this data, and is the data that you’ve collected specifically to achieve that goal?

0 Comments
Continue reading

Hackers Target Voter Information Databases to Steal Personal Data

Hackers Target Voter Information Databases to Steal Personal Data

Hackers are always getting their hands into sticky situations, but one of the hot topics in world politics--the 2016 United States presidential election--is one of the nastier ones in recent years. In the past few months alone, hackers have reportedly breached not only the Democratic National Committee, but have also infiltrated at least two state election databases.

0 Comments
Continue reading

Tip of the Week: 8 Upgrades to Facebook Messenger that Make it Business Worthy

Tip of the Week: 8 Upgrades to Facebook Messenger that Make it Business Worthy

When Facebook released its Messenger app in 2011, it was primarily designed as a way for users to chat with each other outside of the main Facebook app. Since then, Facebook has added a plethora of new features and upgrades to Messenger, making it a tool that may have what it takes to meet the needs of your business.

0 Comments
Continue reading

This Halloween, Dress Like a Hacker and Terrify Your IT Administrator

This Halloween, Dress Like a Hacker and Terrify Your IT Administrator

Halloween is a time when people of all ages dress up as something spooky that they’re really not. For the scariest of hackers, every day is like a reverse Halloween as they try to scam victims by pretending to be someone safe and trustworthy--a persona that they’re really not. This Halloween, don’t get tricked by the haunted hack!

0 Comments
Continue reading

4 Reasons Why You Should Give Office 365 a Try

4 Reasons Why You Should Give Office 365 a Try

It can be stressful to select the right technology for your business. To take some of this pressure off of your shoulders, we’d like to make a suggestion--look into Microsoft Office 365. It could be just the solution you need to make several of your responsibilities easier.

0 Comments
Continue reading

Tip of the Week: Avoid Buyer’s Remorse By Renting a Gadget Before Buying It

Tip of the Week: Avoid Buyer’s Remorse By Renting a Gadget Before Buying It

When it comes to buying technology, sometimes, despite the fact that the Internet offers a plethora of product reviews and detailed information for you to research to your heart’s content, it’s still possible to regret your purchase and decide to return it. In order to combat buyer’s remorse, more services are popping up that let consumers rent products before buying.

0 Comments
Continue reading

This NSA Employee Made a Mistake. How Hackers Exploited it is Worrisome

This NSA Employee Made a Mistake. How Hackers Exploited it is Worrisome

One of the biggest hacks of 2016 was the United States National Security Agency, by a hacking group calling themselves the Shadow Brokers. This hack came to light after tools belonging to the NSA were discovered on the black market. How could a data breach of this magnitude happen to one of the most secure IT systems in the world? Newly released evidence may provide the answers.

1 Comment
Continue reading

Is it Time to Rethink the 8-Hour Workday?

Is it Time to Rethink the 8-Hour Workday?

How many hours a day do you work? Chances are that, as a business owner, you put in more than the average worker. Your team might put in the requisite eight hours, but you might find yourself putting in more. After all, working more hours means more productivity, right? Well… wrong. A recent study shows that eight hours of work, while revolutionary 200 years ago, is still too long to expect good work from your employees.

0 Comments
Continue reading

Tip of the Week: Merge Your Mobile Devices and Stop Carrying 2 Phones

Tip of the Week: Merge Your Mobile Devices and Stop Carrying 2 Phones

For most things in life, two is better than one--except when it comes to smartphones. Anyone who’s ever tried juggling a work-issued phone and a personal device understands how real this struggle can be. Are you experiencing this multi-phone dilemma? Here are some tips to help you successfully merge your two phones.

0 Comments
Continue reading

3 Considerations Every Business Owner Must Make When Implementing a BYOD Policy

3 Considerations Every Business Owner Must Make When Implementing a BYOD Policy

Bring Your Own Device, or BYOD, has become an accepted practice in the workplace, but only when it’s implemented properly. The fact remains that allowing workers to use their personal devices for work purposes has its benefits and disadvantages, and that you should only allow them to do so after they adhere to your company’s BYOD policy. Of course, this assumes that you actually have a policy, so let’s talk about how to set up a quality BYOD policy.

1 Comment
Continue reading

Shhhh! Library of Congress Hacked

Shhhh! Library of Congress Hacked

Not since the British burned the Library of Congress to the ground in the War of 1812 has there been a more devastating attack on the famous library. Only this time, the recent attack was of the digital variety and King George III had nothing to do with it.

0 Comments
Continue reading

Tip of the Week: 4 Odd Productivity Tips from Successful People

Tip of the Week: 4 Odd Productivity Tips from Successful People

Having a workflow that works for you is the key to being successful. Sometimes, finding such a routine requires taking some rather extraordinary measures. If you’re looking for ways to tweak your workflow to be more productive, then consider these outside-the-box productivity tips from some of history’s very successful people.

0 Comments
Continue reading

Google Throws Down the Gauntlet for Hackers to Breach Their New Phone

Google Throws Down the Gauntlet for Hackers to Breach Their New Phone

There are many ways to fund a project, but one of the more interesting ways to do so in today’s web-centric culture is through crowdfunding. It’s been so effective that even major companies like Google are using it to their advantage. Google’s latest project encourages users to hack into the Nexus line of mobile devices to collect potential vulnerabilities, with the promise of prizes for those who are successful.

1 Comment
Continue reading

Just Because You Backup Your Data, Doesn’t Mean it Will Survive a Disaster

Just Because You Backup Your Data, Doesn’t Mean it Will Survive a Disaster

There’s a dangerous misconception that a lot of business owners have about data backup. Too often, an SMB will have a data backup solution in place and the business owner will feel like they’re fully prepared to handle a data loss disaster--without looking into the data recovery capabilities of their backup solution (or the lack thereof). This kind of oversight can lead to a very costly surprise when a disaster strikes and there’s no easy way to restore the lost data.

0 Comments
Continue reading

Tip of the Week: A Step-By-Step Guide to Customize Your Windows 10 Notifications

Tip of the Week: A Step-By-Step Guide to Customize Your Windows 10 Notifications

Windows 10’s updates have provided users with entirely new ways to receive notifications, including the ability to sync their notifications via Android’s Cortana app. However, you’ll be happy to hear that you can control how these notifications appear. We’ll walk you through some basic steps on how to customize your Windows 10 notifications.

0 Comments
Continue reading

AOL CEO Gets His Twitter Account Hacked and the Internet Responds Appropriately

AOL CEO Gets His Twitter Account Hacked and the Internet Responds Appropriately

Imagine that you are the CEO of a mass media organization whose Twitter has just been hacked and was now posting 20 spam-filled tweets every second. You’ve just put yourselves in the shoes of Tim Armstrong, CEO of now-Verizon-subsidiary AOL.

1 Comment
Continue reading

Use Your Smartphone With the Lights Off and Risk Temporary Blindness

Use Your Smartphone With the Lights Off and Risk Temporary Blindness

You may have heard of digital eye strain. The Vision Council defines it as “the physical discomfort felt after two or more hours in front of a digital screen and is associated with the close to mid-range distance of digital screens.” As annoying as this condition is, in some cases, it has actually developed into something far worse, like temporary blindness.

0 Comments
Continue reading

Tip of the Week: 3 Ways to Minimize the Chance of Cloud Migration Failure

Tip of the Week: 3 Ways to Minimize the Chance of Cloud Migration Failure

Moving to the cloud is not an easy task, and it’s certainly not a process that will be the same for every SMB. Therefore, you need to be open to adaptation as the process wears on. Unplanned-for issues might make it difficult to adhere 100 percent to your plans, so if you can’t adapt to that which you can’t predict, your cloud migration is doomed to failure.

0 Comments
Continue reading

Your New Galaxy Note 7 Has a 1 in 42,000 Chance of Exploding

Your New Galaxy Note 7 Has a 1 in 42,000 Chance of Exploding

If you have the most recent addition to Samsung’s growing collection of smartphones, we hope you haven’t grown too attached to it. The company is recalling the Galaxy Note 7 on reports that the batteries explode. This event is largely considered one of the more high-profile recalls in the history of consumer technology.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite
Washington Works