301-571-5040    Get SUPPORT

Washington Works Blog

Washington Works has been serving the Bethesda area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Dangerous Android App Masquerading as System Update

Dangerous Android App Masquerading as System Update

Let’s face it, most people are glued to their phones when they have downtime. Many don’t look up to cross the street. With this much dedication to their individual mobile devices you’d think that people would be more careful about what they download.

0 Comments
Continue reading

2020 Was Rough for Healthcare Where IT Was Concerned

2020 Was Rough for Healthcare Where IT Was Concerned

2020 was, obviously, a challenging year for healthcare providers. In addition to the obvious issue of the COVID-19 pandemic creating serious operational, financial, and supply chain difficulties, cybersecurity concerns didn’t go away during this time. Let’s consider some of the additional stresses that IT security needs can, will, and have placed on healthcare providers.

0 Comments
Continue reading

Do Google’s New Policies on User Data Privacy Indicate Larger Changes?

Do Google’s New Policies on User Data Privacy Indicate Larger Changes?

Just in case you haven’t been paying attention, online privacy has been highlighted significantly in recent years—in no small part due to the sale of our profiles by the tech giants that provide today’s most (in)famous websites… including and especially Google. Having said this, it is also important to acknowledge that some of Google’s recent policy changes could suggest that this may change at some point.

0 Comments
Continue reading

Securing Utilities Has to Be a Priority

Securing Utilities Has to Be a Priority

It’s been reported that a hacker virtually broke into a Floridian water treatment facility and briefly increased the levels of sodium hydroxide in the Pinellas County water supply. Fortunately, onsite operators noticed the spike and reduced it right away, keeping the public from risk of increased levels of poison in their water. This is just the latest story in a seemingly never-ending supply of them that have to do with public utilities being at risk from cyberattacks. Today, we will take a look at this issue. 

0 Comments
Continue reading

Conduct a Security and Compliance Audit, You Won’t Regret It

Conduct a Security and Compliance Audit, You Won’t Regret It

If you are an avid reader of our blog, we are constantly saying how there are always a growing number of threats. This is true. Two-in-every-three business owners consider that their cybersecurity risks are increasing each year. The other third must not focus on them, and that is a problem. In fact, many business owners don’t give the proper respect to cyberthreats and many of those businesses pay the price. This is why every business should consider a security and compliance audit a mandatory part of their yearly IT assessment. 

0 Comments
Continue reading

The Democratic Republic of Congo’s Near Miss Teaches an Important Security Lesson

The Democratic Republic of Congo’s Near Miss Teaches an Important Security Lesson

To preserve your cybersecurity, you need to have a comprehensive view of everything involved with your technology—and we do mean everything. Let’s consider a recent close call, involving the Democratic Republic of Congo that exemplifies this perfectly that could have potentially exposed millions of Internet users to serious threats.

0 Comments
Continue reading

Be Sure to Update Your Microsoft Passwords

Be Sure to Update Your Microsoft Passwords

The new year is upon us and after the debacle that 2020 was, it is extremely welcome. If you are like us, you have a new set of goals that you’ve created for yourself and are probably looking to improve your professional and personal well-being. One way to do that is to ensure that your accounts are secure. Today, we will be going through how to update your password with Microsoft.

0 Comments
Continue reading

How to Make Your Google Account More Secure

How to Make Your Google Account More Secure

Going through your passwords and updating them every so often is a very wise habit to get into, particularly when they are used to protect a lot of data—as the password to your Google account often is. Considering this, let’s go over how to update your Google password and otherwise lock down your account.

0 Comments
Continue reading

Holding Your Own Against Today's Most Pressing Threats

Holding Your Own Against Today's Most Pressing Threats

For all the attention that we (and many others) give to cybercrime, people are still falling victim to hacks and scams every day. With most businesses operating more in the digital sphere than ever before, it stands to reason that they need to do more to keep from being a victim of a data breach or worse. Here are six things your business should do to keep from being a victim of a cyberattack.

0 Comments
Continue reading

A Field Guide to Phishing Attacks

A Field Guide to Phishing Attacks

Despite the name being mildly amusing, phishing attacks are no laughing matter. These scams, in all their different forms, wreak havoc on businesses—ranking as the top breach threat in the 2020 edition of Verizon’s annual Data Breach Investigations Report, and successfully impacting 65 percent of United States organizations in 2019 as reported by Proofpoint’s 2020 State of the Phish Report. Avoiding them requires you to be able to spot them, so let’s go over the different varieties of phishing that can be encountered.

0 Comments
Continue reading

Is Security Being Sacrificed for the Sake of Convenience?

Is Security Being Sacrificed for the Sake of Convenience?

While this time of year is always huge for online retail, there is likely to be a much larger number of people turning to the Internet for their holiday purchases than usual… and, it would seem, a larger number of people taking security into consideration as they do so. Let’s examine how consumers are taking their data into their own hands and what this means for your business.

0 Comments
Continue reading

Smishing Isn’t as Funny as It Sounds

Smishing Isn’t as Funny as It Sounds

As serious as they are, cyberattacks aren’t always given the most serious-sounding names. We are, of course, referring to “phishing”: the manipulation of the user, rather than of a computer system, to gain access to data. Phishing can come in many forms, with some—like phishing someone via SMS message—doubling down on the silliness of the name. Let’s examine this variety, and why “smishing” is not something to trifle with.

0 Comments
Continue reading

Adobe Retiring Support for Flash at Year’s End

Adobe Retiring Support for Flash at Year’s End

Flash Player—the familiar Adobe web application that first premiered in 1996—is finally going into retirement at the end of the year. This is quite a big deal, as Flash Player was (at least initially) instrumental to many of the platforms that so many rely on these days. However, what will this mean for your business?

0 Comments
Continue reading

Don’t Let This Year’s Low Number of Data Breaches Get Your Hopes Up

Don’t Let This Year’s Low Number of Data Breaches Get Your Hopes Up

You may have heard whispers that, compared to the past few years, 2020 has seen considerably fewer data breaches play out. While this may sound like a cause for celebration, we wanted to share a few reasons that this news may not be as great as it appears.

0 Comments
Continue reading

Innovative Cybersecurity Tools Your Business Needs

Innovative Cybersecurity Tools Your Business Needs

Despite the events of recent months, cybersecurity can never be too far from your awareness—especially where your business is concerned. As a refresher, let’s go over a few solutions that you need to have in place to protect your business from the persistent threats that are out there.

0 Comments
Continue reading

How to Beat Cybercrime and Stay Secure

How to Beat Cybercrime and Stay Secure

Unfortunately, it is hard for the modern business to keep all of their data secure. There are just so many threats that most businesses leak data without even knowing it. There are things you can do, however. Today we will go through four considerations that can help you stay ahead of cybercriminals. 

0 Comments
Continue reading

4 Cybersecurity Tools You Need to Know About

4 Cybersecurity Tools You Need to Know About

It may be an understatement to say that business has been difficult thus far in 2020. With all that is going on, nobody should have to deal with cybercrime. Unfortunately, it remains a major consideration for every IT administrator and business owner. With complex solutions being developed to help ward off these cyberthreats, strategies are changing. Today, we thought we’d take a look at four security tools your business should consider to help keep these scammers out of your network. 

0 Comments
Continue reading

How Has COVID-19 Impacted Cybersecurity Needs?

How Has COVID-19 Impacted Cybersecurity Needs?

Data security is always a challenge that businesses must rise to meet, but the COVID-19 pandemic has complicated things significantly by creating situations that make ensuring this security even more difficult. Let’s go over the impacts that many organizations—especially those in the healthcare industry—have had to deal with due, in part, to the coronavirus.

0 Comments
Continue reading

Cybercrime Spiking During the Pandemic

Cybercrime Spiking During the Pandemic

Keeping your network and infrastructure free from threats is always a priority, but with so many people working remotely businesses have encountered problems doing so. In fact, hackers, known for their opportunism, have been ultra-opportunistic during this period and it is causing many headaches for network administrators. Let’s take a look at some statistics that are definitely concerning as we head into the fall, where many experts expect the virus to become more problematic. 

0 Comments
Continue reading

A Security Briefing on Chrome Extensions

A Security Briefing on Chrome Extensions

Did you know that, as of July 2020, 69 percent of global desktop Internet users utilized Google Chrome as their browser of choice? With such a large market share, the security associated with Google Chrome is important to keep in mind. To help increase some of this awareness, we wanted to talk about Chrome’s many extensions and the permissions they are too often granted, with minimal awareness from the user.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite