301-571-5040    Get SUPPORT

Washington Works Blog

Washington Works has been serving the Bethesda area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Ransomware Cyberattack Struck Atlanta, Georgia

A Ransomware Cyberattack Struck Atlanta, Georgia

Ransomware doesn’t discriminate with its targets, as the city of Atlanta, Georgia now knows so painfully well. The city became the target of a ransomware attack that crippled many of its critical system workflows. The municipal government suffered from one of the most advanced and sustained attacks in recent memory.

0 Comments
Continue reading

Targeted Ransomware Checks for Particular Attributes

Targeted Ransomware Checks for Particular Attributes

Put yourself in the shoes of a cybercriminal. If you were to launch a ransomware attack, who would be your target? Would you launch an indiscriminate attack to try to snare as many as you could, or would you narrow your focus to be more selective? As it happens, real-life cybercriminals have largely made the shift to targeted, relatively tiny, ransomware attacks.

0 Comments
Continue reading

30 Schools Shut Down In Montana After Cyber Attack

30 Schools Shut Down In Montana After Cyber Attack

Students generally love it when classes are cancelled for whatever reason, but thanks to a cybercriminal group called TheDarkOverlord Solutions, a school in Flathead Valley, Montana was disrupted for an extended period of time. This downtime resulted in a disruption of operations for over 30 schools, as well as the threat to the personal information of countless teachers, students, and administrators due to a ransomware attack.

0 Comments
Continue reading

Tip of the Week: Ransomware Is Exploding… Is Your Business Ready For The Blast?

Tip of the Week: Ransomware Is Exploding… Is Your Business Ready For The Blast?

When it comes to Internet threats, ransomware is the one that causes the most fear, especially for small and medium-sized businesses, as it should. According to the Cisco 2017 Annual Cybersecurity Report, ransomware is growing at a yearly rate of 350%. It’s time to make sure that you’re doing what you can to stop your business from becoming another ransomware statistic. Here’s five very good tips that will help you avoid becoming a victim of the next big ransomware attack!

0 Comments
Continue reading

Would You Share Your Browser History? This Ransomware Will

Ransomware is a tricky piece of malware that locks down the precious files located on a victim’s computer, then (in theory) will return access to them when a ransom has been paid. Depending on the files stored on a victim’s computer, they might simply blow it off and not worry too much about losing access to a couple of pictures or videos--but what if this ransomware threatened to expose your web browsing history?

0 Comments
Continue reading

Software Patches Take on New Importance After the WannaCry Ransomware Fiasco

Software Patches Take on New Importance After the WannaCry Ransomware Fiasco

On May 11th, 2017, the world was introduced to the WannaCry ransomware. The ransomware spread around the globe like wildfire, infecting hundreds of thousands of devices and catching many major organizations and businesses by surprise. The full extent of the ransomware’s damage is still being assessed, yet, one thing we do know: this whole fiasco was preventable.

0 Comments
Continue reading

Getting Greedy: Ransomware Hackers are Asking for Way More Money

Getting Greedy: Ransomware Hackers are Asking for Way More Money

If fiscal reasons have stopped you from securing your network against ransomware thus far, you may want to reconsider your strategy. Not only are attacks still becoming more and more prevalent, but the developers of ransomware have lowered the price of admission for aspiring cyber criminals. Fortunately, there are some steps you can take to keep your business protected against a ransomware attack.

0 Comments
Continue reading

A Look Back at 2016’s Biggest Cyber Security Stories

A Look Back at 2016’s Biggest Cyber Security Stories

2016 saw many notorious data breaches, along with developments in malware and other threats to security. It’s always helpful to reflect on these developments so that the knowledge can be used in the future to aid in developing new strategies for taking on the latest threats. How will your business learn from the mistakes of others in 2017?

0 Comments
Continue reading

Some Evil Genius Just Combined the Pyramid Scheme With Ransomware

Some Evil Genius Just Combined the Pyramid Scheme With Ransomware

The ransomware machine keeps moving forward, despite significant opposition. In particular, the ransomware tag-team duo of Petya and Mischa have steamrolled most attempts to block them from accessing critical systems, always finding ways to outsmart security professionals. Now, these ransomwares have adopted a Ransomware as a Service model, which has made significant changes to the way that this ransomware is distributed.

0 Comments
Continue reading

Ransomware: A Hated Malware With an Intriguing Past

Ransomware: A Hated Malware With an Intriguing Past

The short, yet devastating, history of ransomware is littered with what amounts to individual horror stories. As you may well know, ransomware, is a particularly devious and potentially devastating strain of malware that, when enacted, locks a computer’s files down so that the user can’t access them. In their stead, a message is relayed that instructs them to contact a third party to pay a ransom for access to the files. This is where the threat gets its name.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Cloud Business Computing Privacy Malware Hackers Software Network Security Email Backup Tech Term Mobile Devices Business Internet Managed IT Services Ransomware Computer Microsoft Hosted Solutions Productivity User Tips Google Data Recovery Smartphone Data Backup Productivity Android Managed Service Provider IT Services Office 365 Paperless Office Cloud Computing IT Support Data Management Small Business Efficiency Social Media Windows 10 Encryption Business Continuity Business Management Remote Monitoring Hardware Data Browser Outsourced IT Communication Disaster Recovery Smartphones Government BYOD Bandwidth Work/Life Balance Cybersecurity Workplace Tips Save Money App Innovation Infrastructure Tip of the week Server Facebook Word Risk Management How To Artificial Intelligence SaaS Phishing Saving Money Document Management Internet of Things Antivirus Password Two-factor Authentication Compliance Windows Managed IT Services File Sharing Chromebook Apps Big Data Chrome Employer-Employee Relationship Windows 10 Holiday Applications BDR Hosted Solution Vulnerability Unified Threat Management IT Management Money Virtual Reality Physical Security Automation Hacker Server Management Virtual Private Network Customer Relationship Management Firewall Office Collaboration Twitter Computer Care Robot Recovery Training Blockchain Remote Computing Gmail Identity Theft Tech Support Regulations IoT Maintenance Business Technology Automobile Alert Health HIPAA Mobile Security Samsung G Suite Smart Technology Computing Patch Management Politics Scam Vendor Management Taxes Data loss Wi-Fi Websites Mobile Device Passwords VPN Botnet Data Security Storage Telephone Systems Cookies Break Fix Administrator Professional Services Settings Alerts GPS Webcam Microsoft Office Legislation Machine Learning Enterprise Content Management Google Drive Chatbots Education Nanotechnology Solid State Drive Dark Web Black Market Statistics Mail Merge Website USB Digital Licensing Tracking Point of Sale Crowdsourcing Mouse Relocation Techology Unified Communications VoIP Identity Cleaning Screen Reader Hard Disk Drive Microsoft Excel IT Solutions Bluetooth Personal Information Address Dongle Spyware Cooperation Tablet Private Cloud Update Unified Threat Management Spam Bring Your Own Device Avoiding Downtime Smart Tech Downtime Upgrades Mobile Device Management Service Level Agreement Staff Web Server Comparison Error User Error Vulnerabilities Time Management Connectivity Augmented Reality Computer Repair Utility Computing How To Cameras Specifications Communications Geography Network Management Permissions Cybercrime Processors Managed IT The Internet of Things Healthcare Analytics Wearable Technology Supercomputer CCTV Printer Law Enforcement Black Friday Budget High-Speed Internet Touchscreen Gadgets Social Networking IT Support Star Wars Corporate Profile Fraud Outlook Lenovo Management IT Budget Access Control Gadget Cyber Monday Emoji Development Motherboard Cabling Shortcut Cost Management WannaCry Travel Electronic Medical Records Superfish Upgrade Enterprise Resource Planning Firefox Digital Payment SharePoint Virtualization Cables Assessment Monitors Hotspot Staffing Motion Sickness Wireless Search Legal Mobile IT Technicians Downloads Router Disaster Distributed Denial of Service Office Tips VoIP Wires Heating/Cooling Social Internet Exlporer Language Network Notifications Multi-Factor Security Sports Networking Company Culture Mirgation IT Consultant Modem Uninterrupted Power Supply Managed IT Service Cortana Servers Value YouTube Computing Infrastructure WiFi Meetings Google Calendar IBM Managing Stress Quick Tips Marketing IP Address Customer Service Mobile Office Domains Hard Drives Public Speaking CrashOverride Lithium-ion battery Emergency Safety Hiring/Firing Competition Fun Users Miscellaneous Presentation Managed Service Wireless Technology 5G