301-571-5040    Get SUPPORT

Washington Works Blog

Washington Works has been serving the Bethesda area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Targeted Ransomware Checks for Particular Attributes

Targeted Ransomware Checks for Particular Attributes

Put yourself in the shoes of a cybercriminal. If you were to launch a ransomware attack, who would be your target? Would you launch an indiscriminate attack to try to snare as many as you could, or would you narrow your focus to be more selective? As it happens, real-life cybercriminals have largely made the shift to targeted, relatively tiny, ransomware attacks.

0 Comments
Continue reading

30 Schools Shut Down In Montana After Cyber Attack

30 Schools Shut Down In Montana After Cyber Attack

Students generally love it when classes are cancelled for whatever reason, but thanks to a cybercriminal group called TheDarkOverlord Solutions, a school in Flathead Valley, Montana was disrupted for an extended period of time. This downtime resulted in a disruption of operations for over 30 schools, as well as the threat to the personal information of countless teachers, students, and administrators due to a ransomware attack.

0 Comments
Continue reading

Tip of the Week: Ransomware Is Exploding… Is Your Business Ready For The Blast?

Tip of the Week: Ransomware Is Exploding… Is Your Business Ready For The Blast?

When it comes to Internet threats, ransomware is the one that causes the most fear, especially for small and medium-sized businesses, as it should. According to the Cisco 2017 Annual Cybersecurity Report, ransomware is growing at a yearly rate of 350%. It’s time to make sure that you’re doing what you can to stop your business from becoming another ransomware statistic. Here’s five very good tips that will help you avoid becoming a victim of the next big ransomware attack!

0 Comments
Continue reading

Would You Share Your Browser History? This Ransomware Will

Ransomware is a tricky piece of malware that locks down the precious files located on a victim’s computer, then (in theory) will return access to them when a ransom has been paid. Depending on the files stored on a victim’s computer, they might simply blow it off and not worry too much about losing access to a couple of pictures or videos--but what if this ransomware threatened to expose your web browsing history?

0 Comments
Continue reading

Software Patches Take on New Importance After the WannaCry Ransomware Fiasco

Software Patches Take on New Importance After the WannaCry Ransomware Fiasco

On May 11th, 2017, the world was introduced to the WannaCry ransomware. The ransomware spread around the globe like wildfire, infecting hundreds of thousands of devices and catching many major organizations and businesses by surprise. The full extent of the ransomware’s damage is still being assessed, yet, one thing we do know: this whole fiasco was preventable.

0 Comments
Continue reading

Getting Greedy: Ransomware Hackers are Asking for Way More Money

Getting Greedy: Ransomware Hackers are Asking for Way More Money

If fiscal reasons have stopped you from securing your network against ransomware thus far, you may want to reconsider your strategy. Not only are attacks still becoming more and more prevalent, but the developers of ransomware have lowered the price of admission for aspiring cyber criminals. Fortunately, there are some steps you can take to keep your business protected against a ransomware attack.

0 Comments
Continue reading

A Look Back at 2016’s Biggest Cyber Security Stories

A Look Back at 2016’s Biggest Cyber Security Stories

2016 saw many notorious data breaches, along with developments in malware and other threats to security. It’s always helpful to reflect on these developments so that the knowledge can be used in the future to aid in developing new strategies for taking on the latest threats. How will your business learn from the mistakes of others in 2017?

0 Comments
Continue reading

Some Evil Genius Just Combined the Pyramid Scheme With Ransomware

Some Evil Genius Just Combined the Pyramid Scheme With Ransomware

The ransomware machine keeps moving forward, despite significant opposition. In particular, the ransomware tag-team duo of Petya and Mischa have steamrolled most attempts to block them from accessing critical systems, always finding ways to outsmart security professionals. Now, these ransomwares have adopted a Ransomware as a Service model, which has made significant changes to the way that this ransomware is distributed.

0 Comments
Continue reading

Ransomware: A Hated Malware With an Intriguing Past

Ransomware: A Hated Malware With an Intriguing Past

The short, yet devastating, history of ransomware is littered with what amounts to individual horror stories. As you may well know, ransomware, is a particularly devious and potentially devastating strain of malware that, when enacted, locks a computer’s files down so that the user can’t access them. In their stead, a message is relayed that instructs them to contact a third party to pay a ransom for access to the files. This is where the threat gets its name.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Best Practices Business Computing Malware Hackers Privacy Network Security Business Software Email Productivity Ransomware Microsoft Backup User Tips Android Smartphone Mobile Devices Efficiency Small Business Google Windows 10 Internet Managed IT Services Computer Managed Service Provider Office 365 Encryption Business Continuity Business Management IT Services Hosted Solutions Workplace Tips Outsourced IT Productivity Browser Social Media Cloud Computing Communication Data Management Data Recovery Remote Monitoring Smartphones Hardware Work/Life Balance Tip of the week Save Money Apps App IT Management Holiday Big Data Innovation Word Hosted Solution Unified Threat Management Phishing Money Server Facebook Virtual Reality Risk Management Antivirus IT Support Disaster Recovery How To Windows SaaS Cybersecurity Paperless Office Government Password Windows 10 Bandwidth Automobile Scam Data Tech Support Alert Health Vulnerability Mobile Device Samsung Telephone Systems Computing Data Security Server Management Employer-Employee Relationship Virtual Private Network Taxes Politics Firewall Artificial Intelligence Websites Botnet Document Management Wi-Fi Automation Data Backup Physical Security Hacker Managed IT Services Collaboration Twitter Office Maintenance Business Technology Computer Care Robot HIPAA Saving Money BYOD Recovery Mobile Security Training Chrome File Sharing Two-factor Authentication Infrastructure Patch Management Distributed Denial of Service CCTV Monitors Law Enforcement Staffing Augmented Reality Language Vendor Management Mirgation Heating/Cooling Multi-Factor Security Disaster Managed IT Service Data loss Gadget Network Emoji Networking Computing Infrastructure Budget Servers Google Calendar Gadgets Travel Uninterrupted Power Supply Electronic Medical Records VPN Break Fix G Suite YouTube WiFi Alerts Quick Tips Legislation Motion Sickness Legal Dark Web Settings GPS Office Tips Licensing Upgrade Google Drive Statistics Mouse Solid State Drive Notifications Virtualization Social Sports Wireless Mail Merge Microsoft Excel IT Consultant Digital Tracking VoIP Search Techology Cooperation Bluetooth Tablet Meetings Hard Disk Drive Address Internet of Things Spyware Avoiding Downtime Administrator Unified Threat Management Staff Cortana Comparison Passwords Webcam Machine Learning Blockchain Education IBM Time Management Black Market User Error Gmail Specifications Point of Sale Crowdsourcing Relocation Identity Theft Microsoft Office Permissions Cleaning How To Customer Relationship Management Network Management Printer Wearable Technology Personal Information Managed IT Black Friday Private Cloud Supercomputer Update Fraud Analytics Touchscreen Access Control Downtime IT Support IT Solutions Outlook Cyber Monday Web Server Corporate Profile Error IT Budget Lenovo SharePoint Cabling Remote Computing Applications Upgrades Computer Repair Mobile Device Management Shortcut Smart Technology Cameras WannaCry Communications Digital Payment Chromebook Superfish Hotspot Firefox Downloads Cybercrime Processors IT Technicians Lithium-ion battery Safety The Internet of Things Hiring/Firing Competition Fun Users Miscellaneous VoIP Presentation 5G Wireless Technology CrashOverride Marketing Emergency IP Address Website Customer Service Mobile Office Domains Spam Hard Drives Public Speaking