301-571-5040    Get SUPPORT

Washington Works Blog

Washington Works has been serving the Bethesda area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Being Courteous and Professional with a Mobile Device

Tip of the Week: Being Courteous and Professional with a Mobile Device

With how business is conducted today, the capability of your workforce to stay connected while mobile is important. However, it can be equally important that this connectivity doesn’t come at the cost of their manners. Let’s go over a few ways to be more polite as you work remotely using a mobile device.

0 Comments
Continue reading

Document Your IT Infrastructure

Document Your IT Infrastructure

Quick, off the top of your head, how many network switches are in use at your office? How many wireless access points? How many routers are past their warranty or no longer getting support?

That’s not a question most business owners are asked on a regular basis, and we don’t really expect you to be able to rattle off the answers. You should have all of that information documented though.

0 Comments
Continue reading

Five Cool Technologies You Can Give for Secret Santa

Five Cool Technologies You Can Give for Secret Santa

The strangest year in our lives is coming to a close and the holidays figure to be just as strange. With the COVID-19 pandemic still roaring away, there probably won’t be a lot of the events that are typical this time of year. That doesn’t have to ruin the time of year, however. Today, we thought that we would take a look at five cool tech gadgets and services that won’t break the bank, but will also be a cool addition under the tree or for your secret santa. 

0 Comments
Continue reading

Tip of the Week: Sign a PDF in Windows

Tip of the Week: Sign a PDF in Windows

PDFs have been around for a while and they have become an extremely useful file format for business. One of the best features of the PDF is that it is useful for securing signatures so that contracts can be handled over the Internet. Today, we’ll go over how you go about signing a PDF in Windows.

0 Comments
Continue reading

A Field Guide to Phishing Attacks

A Field Guide to Phishing Attacks

Despite the name being mildly amusing, phishing attacks are no laughing matter. These scams, in all their different forms, wreak havoc on businesses—ranking as the top breach threat in the 2020 edition of Verizon’s annual Data Breach Investigations Report, and successfully impacting 65 percent of United States organizations in 2019 as reported by Proofpoint’s 2020 State of the Phish Report. Avoiding them requires you to be able to spot them, so let’s go over the different varieties of phishing that can be encountered.

0 Comments
Continue reading

Social Media Is A Tool For Any Sized Business

Social Media Is A Tool For Any Sized Business

Nowadays, social media companies have a lot of power and influence, which is part of the reason that so many of today’s largest businesses have adopted social media as a critical promotional tool. With the average person spending about two hours and 24 minutes on social media and messaging applications per day, this makes social media a clear opportunity for any sized business to embrace. Let’s consider a few ways this can be accomplished for these different businesses.

0 Comments
Continue reading

What Exactly is Software-as-a-Service?

What Exactly is Software-as-a-Service?

Businesses have many problems they need to solve. With technology, the process typically starts with identifying a problem, researching solutions, and finding one that will successfully work to solve the problem. Traditionally, when dealing with technology, a company would procure the hardware and hire technicians to implement the solution and deploy the services needed. If they had to borrow money to do it, they would because the profits would presumably be more than the payments even with banks tacking on interest. 

0 Comments
Continue reading

Is Security Being Sacrificed for the Sake of Convenience?

Is Security Being Sacrificed for the Sake of Convenience?

While this time of year is always huge for online retail, there is likely to be a much larger number of people turning to the Internet for their holiday purchases than usual… and, it would seem, a larger number of people taking security into consideration as they do so. Let’s examine how consumers are taking their data into their own hands and what this means for your business.

0 Comments
Continue reading

Homeland Security is Warning Businesses to Update Google Chrome

Homeland Security is Warning Businesses to Update Google Chrome

We realize that it’s one thing for us to tell you how important it is to update your software. After all, we’re tech guys, so we worry about that kind of thing all the time. Hopefully, it’s quite another matter when Homeland Security does it, which is why we’re really hoping that you take heed of this warning and update Google Chrome.

0 Comments
Continue reading

Smishing Isn’t as Funny as It Sounds

Smishing Isn’t as Funny as It Sounds

As serious as they are, cyberattacks aren’t always given the most serious-sounding names. We are, of course, referring to “phishing”: the manipulation of the user, rather than of a computer system, to gain access to data. Phishing can come in many forms, with some—like phishing someone via SMS message—doubling down on the silliness of the name. Let’s examine this variety, and why “smishing” is not something to trifle with.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite