301-571-5040    Get SUPPORT

Washington Works Blog

Washington Works has been serving the Bethesda area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Prepare a Data Breach Response

Tip of the Week: How to Prepare a Data Breach Response

Unfortunately, the more people lean on technology, the more data breaches there are. The correlation makes sense, but with so much innovation in data security and data systems, it’s a shame more can’t be done to keep businesses and individuals from losing data to opportunists and scammers. That’s why knowing how to circumvent these forces is essential to keep your data safe. Let’s take a look at how the people that are best at it keep their data secure. 

0 Comments
Continue reading

If You Haven’t Already, It’s Time to Thoroughly Document Your Business IT

If You Haven’t Already, It’s Time to Thoroughly Document Your Business IT

A business' technology is by all measures a part of its inventory, and as such, it needs to be tracked. Let’s consider why in more detail, and how to do so properly.

0 Comments
Continue reading

Securing Utilities Has to Be a Priority

Securing Utilities Has to Be a Priority

It’s been reported that a hacker virtually broke into a Floridian water treatment facility and briefly increased the levels of sodium hydroxide in the Pinellas County water supply. Fortunately, onsite operators noticed the spike and reduced it right away, keeping the public from risk of increased levels of poison in their water. This is just the latest story in a seemingly never-ending supply of them that have to do with public utilities being at risk from cyberattacks. Today, we will take a look at this issue. 

0 Comments
Continue reading

Tip of the Week: The Guide to Optimal Password Efficacy

Tip of the Week: The Guide to Optimal Password Efficacy

Your business’ security largely depends on how secure the passwords are that keep your resources from being accessed without authorization. Despite this, many users—perhaps even you—frequently sacrifice sufficient security measures in favor of the simple and convenient route, cutting corners when coming up with their passwords. Let’s try and remedy this by reviewing a few practices that can help make a password more effective.

0 Comments
Continue reading

Google Search Now Gives More Info into What You’re Clicking On

Google Search Now Gives More Info into What You’re Clicking On

While Google Search has become eponymous for “online search”, the company has not stopped innovating upon the capabilities of the service. Most recently (as of this writing, of course) one improvement that the company is making is to give more content a bit more context before a user clicks through to a potential threat.

0 Comments
Continue reading

Conduct a Security and Compliance Audit, You Won’t Regret It

Conduct a Security and Compliance Audit, You Won’t Regret It

If you are an avid reader of our blog, we are constantly saying how there are always a growing number of threats. This is true. Two-in-every-three business owners consider that their cybersecurity risks are increasing each year. The other third must not focus on them, and that is a problem. In fact, many business owners don’t give the proper respect to cyberthreats and many of those businesses pay the price. This is why every business should consider a security and compliance audit a mandatory part of their yearly IT assessment. 

0 Comments
Continue reading

Tip of the Week: Browser Best Practices for Boosted Security

Tip of the Week: Browser Best Practices for Boosted Security

Privacy is a sensitive subject nowadays, especially online. Regardless of the browser you have elected to use, properly using it will have a large impact. Let’s review a few ways that you and your team can help secure your business and its resources and go over these settings.

0 Comments
Continue reading

3 Tips to Help You Make Better IT Decisions

3 Tips to Help You Make Better IT Decisions

Making solid business decisions can sometimes be confusing. Not that you try to make anything other than good decisions, but a lot of business is, and has always been, trial and error; and, you may know this from experience, error happens to be a big part of it. Today, we thought we would discuss what goes into good technology decisions and how many times it comes down to the results. 

0 Comments
Continue reading

How AI Can Be Used to Make Your Business More Efficient

How AI Can Be Used to Make Your Business More Efficient

Out of all the technologies that have been introduced into the mainstream over the last few years, artificial intelligence—or AI—leads the pack in terms of innovation. Far from the science fiction of autonomous machines bent on the extinction of humanity, AI is now found in many examples of beneficial software. Let’s consider some ways that businesses can now use AI to their considerable advantage.

0 Comments
Continue reading

Working with Images on the Web, Part 2 - Resizing Images

Working with Images on the Web, Part 2 - Resizing Images

In a recent post, we talked about the various image formats you should use when sharing images over email or online. The goal is to generate an image (or images) that are the smallest file size possible to make them easy to share and quick to download, without reducing the overall quality of the image.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite