301-571-5040    Get SUPPORT

Washington Works Blog

Washington Works has been serving the Bethesda area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Are You Ready to Adapt to Network Security Changes?

Are You Ready to Adapt to Network Security Changes?

Humankind has always adapted and improved technology to make life easier, starting all the way back at fire and the wheel. Nowadays, our approach to making life easier through technology is centered around productivity and security - if we can accomplish more than before in the same amount of time, without worrying that it will be stolen, we’re happy.

0 Comments
Continue reading

FREE Printout: IT Security End-User Checklist

FREE Printout: IT Security End-User Checklist

This guide was created so that business owners, office managers, and IT departments can provide it as an educational resource to showcase some of the most basic IT security practices that can be implemented in your workplace. We recommend printing this out and handing it out to your staff for maximum results.

0 Comments
Continue reading

Tip of the Week: How to Protect Yourself from Invoice Impersonation

Tip of the Week: How to Protect Yourself from Invoice Impersonation

As cybercriminals become increasingly sophisticated in their methods of attack, it is important that your staff--the ones on the front lines--are educated to spot these attempts and know what to do if one is encountered. In order to spot these attacks, it is important to know what to look for.

0 Comments
Continue reading

Data Security Has to Be A Priority For Your Organization

Data Security Has to Be A Priority For Your Organization

Considering that since January 1st of this year, there has been upwards of 10 million personal information records lost or stolen each day, odds are that you, or someone you know, has had their records compromised by a data breach. With such a high incident rate, individuals and businesses that have never received any kind of notification that their records were included in a breach, generally consider themselves lucky and assume that they are not at risk of identity theft or unauthorized account usage. Unfortunately for them, that is not always the case.

0 Comments
Continue reading

October is Cybersecurity Awareness Month

October is Cybersecurity Awareness Month

Cybercrime is the fastest growing criminal activity in the world. From the largest enterprise to the individual, it can affect anyone, anywhere. To help ensure the cybersecurity of American citizens and their businesses, the Department of Homeland Security (DHS), United States Computer Emergency Readiness Team (CERT), and the Federal Bureau of Investigation (FBI) and other agencies work together every October to raise awareness about the threats people face online through a series of educational events and activities.

0 Comments
Continue reading

Who Needs To Be Involved In Network Security? Simple: Everyone

Who Needs To Be Involved In Network Security? Simple: Everyone

Network security is an important part of keeping both your business and your staff away from online threats, but it’s not enough to implement the best, most comprehensive solutions on the market. There are a surprising number of facets to network security, and in order to optimize protection against online threats, you’ll need to know all of them. Thankfully, you don’t have to do this alone.

0 Comments
Continue reading

When It Comes To Your IT, There's No Such Thing As A Dumb Question!

When It Comes To Your IT, There's No Such Thing As A Dumb Question!

Especially with so many people claiming to be tech-savvy, asking a question about IT can be a bit nerve wracking. Because of this hesitation, there are a lot of people who don’t ask questions about technology because they feel like their questions might be stupid. For example, having an updated operating system is a term that is tossed around a lot by IT professionals, and even some not-so-professionals.

0 Comments
Continue reading

Tip of the Week: 12 Security Rules Every PC User Should Follow

Tip of the Week: 12 Security Rules Every PC User Should Follow

While you are probably spending a fair amount of time thinking about your business’ security, can you confidently say the same about those that you’ve employed? Unfortunately, your workers may not put much thought into network security. This could very possibly lead to some severe issues potentially harming your business operations.

0 Comments
Continue reading

How Does a UTM Firewall Protect Your Business?

How Does a UTM Firewall Protect Your Business?

Every time you pick up a personal computer from a vendor, chances are that it will have an extremely basic firewall pre-installed. These consumer-grade firewalls leave much to be desired, especially in the business environment. You’ll want to make sure that your organization is equipped with enterprise-level solutions designed to protect on both a fundamental level and an advanced level. To do this, you want to take advantage of a Unified Threat Management solution.

0 Comments
Continue reading

An Extreme Example of a Fired IT Administrator Taking Revenge

An Extreme Example of a Fired IT Administrator Taking Revenge

It can be easy to underestimate the importance of maintaining permissions on your network. In fact, sometimes it takes a good dose of misfortune to present the consequences of unchecked access to your network. This time, the misfortune befell PA Online, an Internet service provider located in Pennsylvania.

0 Comments
Continue reading

Tip of the Week: 5 Best Practices for Traveling With Technology

Tip of the Week: 5 Best Practices for Traveling With Technology

Do you find yourself traveling for your business? Be it for a conference, a series of meetings that require your attendance, or some other reason, you may very likely need to spend some time on the road; time that could be spent on tasks your business needs to function. Despite the lack of a traditional workspace, this time spent traveling doesn’t necessarily need to be time wasted. Thanks to the technology of today, you have the ability to remain productive while mobile.

0 Comments
Continue reading

Tip of the Week: Protect Your Online Identity With These 8 Tips

Tip of the Week: Protect Your Online Identity With These 8 Tips

The Internet has long been a great tool for business, but you can’t take advantage of it without putting your sensitive data at risk of threats, like hackers and malware. Granted, when it comes to cyber security, even the most cautious business will have a lot on their plate. We’ll go over eight of the most important security best practices, and how you can implement them for your business.

0 Comments
Continue reading

Alert: Acer Breach Compromised Customer Credit Cards

Alert: Acer Breach Compromised Customer Credit Cards

Users of Acer’s online store between May 12th, 2015, and April 28th, 2016, may be in for a rude awakening. Acer may be attempting to contact you to relay that your credit card’s credentials have been lifted by hackers. The breach in question resulted in 34,500 customers having their credentials stolen, including the user’s name, address, credit card number, expiration date, and security code.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Cloud Business Computing Malware Privacy Hackers Software Email Network Security Business Tech Term Internet Backup Managed IT Services Mobile Devices Computer Microsoft Ransomware Productivity User Tips Google Hosted Solutions Data Recovery Smartphone Productivity Data Backup Android Managed Service Provider Paperless Office Small Business Efficiency Social Media Cloud Computing Windows 10 IT Support Data Management IT Services Encryption Office 365 Business Continuity Data Browser Communication Remote Monitoring Business Management Hardware Outsourced IT Bandwidth Government BYOD Work/Life Balance Innovation Workplace Tips Save Money Server App Cybersecurity Facebook Infrastructure Smartphones Disaster Recovery Tip of the week IT Management Apps Password Word File Sharing Artificial Intelligence Big Data Employer-Employee Relationship Chromebook Phishing Document Management Antivirus Internet of Things Compliance Windows Managed IT Services Holiday Hosted Solution Unified Threat Management Money Chrome Windows 10 Virtual Reality Applications Saving Money Risk Management BDR How To Vulnerability Two-factor Authentication SaaS Collaboration Twitter Mobile Device VPN Tech Support Computer Care Data Security Storage Robot Telephone Systems Server Management Virtual Private Network Recovery Training Remote Computing Firewall Automobile Alert Health Wi-Fi Samsung G Suite Blockchain Gmail Computing Passwords Identity Theft Regulations Maintenance Taxes IoT Politics Physical Security Business Technology Hacker Websites Customer Relationship Management Office HIPAA Botnet Mobile Security Automation Smart Technology Patch Management Scam Vendor Management Data loss Company Culture Networking Mirgation Multi-Factor Security Personal Information Uninterrupted Power Supply Modem Augmented Reality Servers Managed IT Service Private Cloud Computing Infrastructure Update YouTube WiFi Value Managing Stress Downtime Quick Tips Google Calendar The Internet of Things Web Server Cookies Break Fix Error Alerts Budget Settings Gadgets GPS Professional Services Enterprise Content Management Chatbots Google Drive Legislation Computer Repair Solid State Drive Cameras Nanotechnology Statistics Dark Web Communications Mail Merge Licensing Digital Tracking USB Unified Communications Cybercrime Techology Identity Processors VoIP Mouse Upgrade Hard Disk Drive CCTV Screen Reader Law Enforcement Bluetooth Microsoft Excel Virtualization Address Cooperation Spyware Dongle Bring Your Own Device Unified Threat Management Wireless Avoiding Downtime Tablet Smart Tech Search Gadget Staff VoIP Emoji Service Level Agreement Vulnerabilities Travel User Error Time Management Comparison Electronic Medical Records Connectivity Utility Computing Cortana How To Geography Motion Sickness Network Management Specifications Permissions IBM Legal Managed IT Healthcare Office Tips Wearable Technology Analytics Printer Supercomputer High-Speed Internet Social Networking Microsoft Office Notifications Touchscreen Black Friday Social IT Support Outlook Fraud Sports Corporate Profile IT Consultant Star Wars Management Lenovo Access Control IT Budget Cabling Development Meetings Motherboard Cyber Monday Website Shortcut WannaCry Cost Management Enterprise Resource Planning IT Solutions Administrator Superfish Firefox SharePoint Digital Payment Cables Webcam Machine Learning Hotspot Spam Monitors Staffing Education Assessment Mobile Upgrades IT Technicians Mobile Device Management Black Market Downloads Disaster Wires Point of Sale Router Crowdsourcing Heating/Cooling Distributed Denial of Service Relocation Language Network Cleaning Internet Exlporer Lithium-ion battery Managed Service Safety Hiring/Firing Competition Fun Users Miscellaneous CrashOverride Presentation Emergency 5G Wireless Technology Marketing IP Address Customer Service Mobile Office Domains Hard Drives Public Speaking