301-571-5040    Get SUPPORT

Washington Works Blog

Washington Works has been serving the Bethesda area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 12 Security Rules Every PC User Should Follow

Tip of the Week: 12 Security Rules Every PC User Should Follow

While you are probably spending a fair amount of time thinking about your business’ security, can you confidently say the same about those that you’ve employed? Unfortunately, your workers may not put much thought into network security. This could very possibly lead to some severe issues potentially harming your business operations.

0 Comments
Continue reading

Next Job on the Automation Chopping Block: Pizza Delivery

Next Job on the Automation Chopping Block: Pizza Delivery

Did you know that over 2,000 Domino’s Pizza franchises in Australia, New Zealand, France, Belgium, The Netherlands, Japan, and Germany feature delivery by robot? Starship Technologies, a self-driving robotics company, announced on March 29th that they would be partnering with Domino’s to revolutionize the way the delivery process works.

Tags:
1 Comment
Continue reading

How Rogue Software Makes PC Problems Worse

How Rogue Software Makes PC Problems Worse

It’s difficult to know what you can and can’t trust in the realm of cybersecurity. However, you’re likely to trust your own security solution. Yet, even this could be a devastating oversight, as some malware masquerades as your security software.

0 Comments
Continue reading

Tip of the Week: Use Windows Start Menu to Search Your PC and the Web

Tip of the Week: Use Windows Start Menu to Search Your PC and the Web

It’s no secret that finding a particular program or file on your computer can be a pain, especially when you don’t have the time to hunt it down by clicking through folders. However, there is a much easier way to locate your desired data. All you need to do is use the search option found in the Start menu, which is the subject of this week’s tip.

0 Comments
Continue reading

How Do You Feel About ISPs Selling Your Internet Browsing History?

How Do You Feel About ISPs Selling Your Internet Browsing History?

In October of 2016, the Federal Communications Commission designed a set of rules known as the Broadband Consumer Privacy Proposal. These rules had intended to flip the status quo and require Internet service providers (ISPs) to gain their customers’ permission before they harvested their browsing histories to sell to advertisers. This proposal is now moot with the establishment of a new law that passed through Congress and was signed by President Trump in April 2017.

0 Comments
Continue reading

The Top 3 Ways Cloud Computing Helps Businesses

The Top 3 Ways Cloud Computing Helps Businesses

Cloud computing has taken the business world by storm, fulfilling so many needs and simplifying as many processes. If you’ve been on the fence about incorporating the cloud into your IT infrastructure, you should know a few of these benefits to help you make your choice.

1 Comment
Continue reading

Tip of the Week: Here’s an Easy Way to Update Your Hardware Drivers in Windows 10

Tip of the Week: Here’s an Easy Way to Update Your Hardware Drivers in Windows 10

The average employee and business owner relies on various hardware solutions to go about their day-to-day duties. These hardware devices--think keyboards, wireless mouses, external microphones, and any USB devices--utilize drivers which allow for inter-device compatibility. What happens when these drivers aren’t installed or kept up to date? Your technology suffers, and so does your productivity.

1 Comment
Continue reading

How a Single Hacker Stole $100 Million From Two Major Tech Companies

How a Single Hacker Stole $100 Million From Two Major Tech Companies

An unfortunate fact about the modern business world is that any organization that utilizes technology is playing with fire. Cyber attacks can circumvent even the most well-protected networks through the company’s users. This is, unfortunately, something that business owners often don’t learn until they’re on the receiving end of an attack; just like the two companies that fell victim to phishing attempts that were supposedly operated by Evaldas Rimasauskas, a Lithuanian hacker who has been accused of stealing $100 million from them.

0 Comments
Continue reading

How Does a UTM Firewall Protect Your Business?

How Does a UTM Firewall Protect Your Business?

Every time you pick up a personal computer from a vendor, chances are that it will have an extremely basic firewall pre-installed. These consumer-grade firewalls leave much to be desired, especially in the business environment. You’ll want to make sure that your organization is equipped with enterprise-level solutions designed to protect on both a fundamental level and an advanced level. To do this, you want to take advantage of a Unified Threat Management solution.

0 Comments
Continue reading

Tip of the Week: 3 Tools for Simplifying Your Company’s Email

Tip of the Week: 3 Tools for Simplifying Your Company’s Email

Managing your company’s email can be a complex endeavor, due to the sheer volume of messages being sent and received, as well as the need to have a way to prioritize which messages are important. It’s safe to say that all organizations can benefit from email management solutions, such as email archiving and spam protection, and multi-factor authentication.

1 Comment
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite