SolutionWorx

SolutionWorx

Comments

Not everyday that Mike Mazan, our CEO gets to thank someone for 20 years of service to SolutionWorx. It's actually a first! Thanks to Ryan Cich for 20 years! We've Come a long way in 20 years! — with Ryan Cich at SolutionWorx.

SolutionWorx is dedicated to our customers' success by providing them best-in-class information tech SolutionWorx is dedicated to our customers' success by providing them best-in-class information technology services and support so they can focus on their business goals and objectives, not their computers and networks.

Operating as usual

Timeline Photos 11/16/2021

Cybercrime is moving at light speed. Only a few years ago, cybercriminals used to shine in identity theft, but now they take over your organization’s network, hack into your bank accounts, and steal tens or hundreds of thousands of dollars. Organizations of every size and type are at risk.

Are you at risk? https://www.wingswept.com/managed-services/

Cybercrime is moving at light speed. Only a few years ago, cybercriminals used to shine in identity theft, but now they take over your organization’s network, hack into your bank accounts, and steal tens or hundreds of thousands of dollars. Organizations of every size and type are at risk.

Are you at risk? https://www.wingswept.com/managed-services/

Timeline Photos 11/11/2021

Happy Veterans Day! We would like to honor all who are currently serving and those who have served. Thank you for your service.

Happy Veterans Day! We would like to honor all who are currently serving and those who have served. Thank you for your service.

Timeline Photos 11/09/2021

According to data from DataReportal in a June 2021 report, the average American spends 7 hours and 11 minutes looking at a screen every day. Can you believe that?

According to data from DataReportal in a June 2021 report, the average American spends 7 hours and 11 minutes looking at a screen every day. Can you believe that?

Timeline Photos 11/04/2021

A reminder to everyone when it comes to installing apps to your mobile device: only install apps from your device's authorized app store. It is a large red flag if there is ever a time where an app asks you to grant it additional privileges.

A reminder to everyone when it comes to installing apps to your mobile device: only install apps from your device's authorized app store. It is a large red flag if there is ever a time where an app asks you to grant it additional privileges.

Timeline Photos 11/02/2021

There are some very convincing email phishing attacks out there. So, how can you tell if an email is fraudulent or not? What questions should you ask yourself?

#phishing #emailtricks #cybersecurity

There are some very convincing email phishing attacks out there. So, how can you tell if an email is fraudulent or not? What questions should you ask yourself?

#phishing #emailtricks #cybersecurity

Timeline Photos 10/31/2021

Happy Halloween! Trick or Treat!? Which do you prefer?

Happy Halloween! Trick or Treat!? Which do you prefer?

Timeline Photos 10/28/2021

What is one quote you personally or your team like to live by?

What is one quote you personally or your team like to live by?

Timeline Photos 10/26/2021

Who has access to sensitive files on your network? You’ve probably locked down sensitive files, such as HR and bookkeeping information, ensuring that only certain people can view them. But how about corporate strategy documents? Data about your clients? Your sales team’s interactions with prospects?

Who has access to sensitive files on your network? You’ve probably locked down sensitive files, such as HR and bookkeeping information, ensuring that only certain people can view them. But how about corporate strategy documents? Data about your clients? Your sales team’s interactions with prospects?

Timeline Photos 10/21/2021

How often do you use public Wi-Fi when you're out and about? One of the best tips we can give you is to never use public Wi-Fi without using a Virtual Private Network (VPN). Protect the data on your device(s) against cybercriminals with a VPN!

How often do you use public Wi-Fi when you're out and about? One of the best tips we can give you is to never use public Wi-Fi without using a Virtual Private Network (VPN). Protect the data on your device(s) against cybercriminals with a VPN!

Timeline Photos 10/18/2021

Good morning and happy Monday, all!

Good morning and happy Monday, all!

Timeline Photos 10/15/2021

We will always be advocates when it comes to cybersecurity awareness, but we do understand the fatigue related to the steady stream of scary threats. To help you wade through all the muck, we’ve highlighted three frequent targets for cyberattacks.

You can check them out here: http://ow.ly/BWZm50GiI15

We will always be advocates when it comes to cybersecurity awareness, but we do understand the fatigue related to the steady stream of scary threats. To help you wade through all the muck, we’ve highlighted three frequent targets for cyberattacks.

You can check them out here: http://ow.ly/BWZm50GiI15

Timeline Photos 10/14/2021

We believe that it takes great employees to deliver great results. If you're looking for a new job opportunity, we are currently hiring for a Network/Systems Engineer and a Systems Analyst. Check out the job postings here - https://lnkd.in/d7tnQAYk.

#JobOpenings #NetworkEngineer #SystemsEngineer #SystemsAnalyst #NowHiring

We believe that it takes great employees to deliver great results. If you're looking for a new job opportunity, we are currently hiring for a Network/Systems Engineer and a Systems Analyst. Check out the job postings here - https://lnkd.in/d7tnQAYk.

#JobOpenings #NetworkEngineer #SystemsEngineer #SystemsAnalyst #NowHiring

10/12/2021

Ready for our fact of the day? You won't believe this one…

#CyberAttacks #NetworkProtection #Cybersecurity

Timeline Photos 10/08/2021

Many small companies and nearly all mid-large sized companies have a managed service provider handling at least some of their technology needs. Providing IT help can come in a few different forms.

#ManagedServices #TechnologyNeeds #NetworkProtection

Many small companies and nearly all mid-large sized companies have a managed service provider handling at least some of their technology needs. Providing IT help can come in a few different forms.

#ManagedServices #TechnologyNeeds #NetworkProtection

Timeline Photos 10/07/2021

If there was one thing we have learned over the last year or more, it's that there are inevitable risks your business needs to be prepared to face. Natural disasters or tragic events can cause an uproar of chaos. If you don't have a plan in place for your business, now's the time to create one.

#businessrisks #businessplan #beprepared

If there was one thing we have learned over the last year or more, it's that there are inevitable risks your business needs to be prepared to face. Natural disasters or tragic events can cause an uproar of chaos. If you don't have a plan in place for your business, now's the time to create one.

#businessrisks #businessplan #beprepared

Timeline Photos 10/04/2021

How often are your employees changing their work-related passwords? By creating unique passwords that change periodically improves your company's security posture dramatically.

#passwordsecurity #managedservices #dataprotection

How often are your employees changing their work-related passwords? By creating unique passwords that change periodically improves your company's security posture dramatically.

#passwordsecurity #managedservices #dataprotection

Timeline Photos 09/30/2021

This year's State of Email Security Report found concerning findings related to the lack of preparation in all things #cybersecurity. Is your organization prepared?

This year's State of Email Security Report found concerning findings related to the lack of preparation in all things #cybersecurity. Is your organization prepared?

Timeline Photos 09/27/2021

Changing offices is stressful. It seems like everything has to happen all at once. There are a few things you’ll need to take care of in advance, or they won’t be ready when you switch offices, causing chaos.

Changing offices is stressful. It seems like everything has to happen all at once. There are a few things you’ll need to take care of in advance, or they won’t be ready when you switch offices, causing chaos.

Timeline Photos 09/23/2021

Last week we touched on Smishing (phishing via SMS). Here's a tip to tell your employees (even your family and friends) when it comes to receiving unexpected text messages…

Last week we touched on Smishing (phishing via SMS). Here's a tip to tell your employees (even your family and friends) when it comes to receiving unexpected text messages…

Timeline Photos 09/21/2021

Is your team still working remotely? Be sure to check in on them. Cyberattacks are more effective now than ever. All of us have become desensitized to “out of the ordinary” events, because so much of the past 18 months has been out of the ordinary. #StayAlert

Is your team still working remotely? Be sure to check in on them. Cyberattacks are more effective now than ever. All of us have become desensitized to “out of the ordinary” events, because so much of the past 18 months has been out of the ordinary. #StayAlert

Timeline Photos 09/16/2021

Are you familiar with the term 'smishing'? Smishing is phishing via Short Message Service (SMS) on a participating device, usually a cell phone. Why is it so popular among hackers?

Are you familiar with the term 'smishing'? Smishing is phishing via Short Message Service (SMS) on a participating device, usually a cell phone. Why is it so popular among hackers?

Timeline Photos 09/14/2021

“Ghost Users” are active accounts for former employees on the corporate network despite their departure from the company. If ghost users don’t sound like things that should be on your network, it’s because they shouldn’t. It’s obviously not a great idea for former employees to have ongoing access to your corporate network. But the bigger risk is a cyberattack.

“Ghost Users” are active accounts for former employees on the corporate network despite their departure from the company. If ghost users don’t sound like things that should be on your network, it’s because they shouldn’t. It’s obviously not a great idea for former employees to have ongoing access to your corporate network. But the bigger risk is a cyberattack.

Timeline Photos 09/09/2021

Are you looking for an opportunity to join a great team that believes in accomplishing big things and having fun while doing it?

We're hiring - check out the careers page on our website for more info!

Are you looking for an opportunity to join a great team that believes in accomplishing big things and having fun while doing it?

We're hiring - check out the careers page on our website for more info!

09/09/2021

Cyber attacks affect companies of all sizes. Whether you're a start up, small business, or large corporation never underestimate hackers' interest in your organization.

Timeline Photos 09/02/2021

The reality is that some of 2021’s phishing schemes are so elaborate that they’re likely to snare at least a few employees. While user training remains a valuable tool to prevent employees from falling for scam emails, it’s difficult to teach every employee to keep their guard up enough to avoid a well-targeted scheme.

The reality is that some of 2021’s phishing schemes are so elaborate that they’re likely to snare at least a few employees. While user training remains a valuable tool to prevent employees from falling for scam emails, it’s difficult to teach every employee to keep their guard up enough to avoid a well-targeted scheme.

Timeline Photos 08/30/2021

A cybercriminal's intent is to inflict maximum pain on a business and its customers and vendors. Are there tax records? Personnel records? Financial account information? Are there embarrassing emails sent to or from your employees? They aren’t just looking to delete your files – they’re hoping to find data they can threaten to share publicly.

A cybercriminal's intent is to inflict maximum pain on a business and its customers and vendors. Are there tax records? Personnel records? Financial account information? Are there embarrassing emails sent to or from your employees? They aren’t just looking to delete your files – they’re hoping to find data they can threaten to share publicly.

Timeline Photos 08/27/2021

When anyone adds news hardware, it changes the layout of your network. Not only do your IT professionals need to make sure the new hardware falls under the existing layer of protection, but they also need to make sure it doesn’t compromise their existing cybersecurity plan.

Always remember...

When anyone adds news hardware, it changes the layout of your network. Not only do your IT professionals need to make sure the new hardware falls under the existing layer of protection, but they also need to make sure it doesn’t compromise their existing cybersecurity plan.

Always remember...

Timeline Photos 08/25/2021

Android and iOS devices have become common targets for cybercriminals, as people use them for work, communications, social media, travel, and important services like finance and healthcare. There are a few signs that may resemble red flags if your smartphone has been hacked...

Android and iOS devices have become common targets for cybercriminals, as people use them for work, communications, social media, travel, and important services like finance and healthcare. There are a few signs that may resemble red flags if your smartphone has been hacked...

Timeline Photos 08/23/2021

One of the many things people want to know after they suffer a ransomware attack is “how did they gain access to my network?” Hackers are sneaky. They will sit on their prey and be patient. Ransomware attackers may stay in the network for up to six months. Small and medium sized businesses compromised with malware often don't discover it for more than two years.

One of the many things people want to know after they suffer a ransomware attack is “how did they gain access to my network?” Hackers are sneaky. They will sit on their prey and be patient. Ransomware attackers may stay in the network for up to six months. Small and medium sized businesses compromised with malware often don't discover it for more than two years.

Timeline Photos 08/20/2021

Data theft happens all the time at big and small companies. Ensure you are taking extra pre-cautions, especially now with so many employees working from home. Here are three ways data theft happens, and how to make sure it doesn’t happen to your business, too.

Data theft happens all the time at big and small companies. Ensure you are taking extra pre-cautions, especially now with so many employees working from home. Here are three ways data theft happens, and how to make sure it doesn’t happen to your business, too.

Timeline Photos 08/18/2021

Do you ignore your devices telling you it's time for an update? The updates are here for a reason!

Do you ignore your devices telling you it's time for an update? The updates are here for a reason!

Timeline Photos 08/16/2021

There are plenty of people who perform critical tasks within a business who aren’t at the top of the organization. After someone leaves is a bad time to discover that a process that person owned was undocumented and is unknown by anyone else…

There are plenty of people who perform critical tasks within a business who aren’t at the top of the organization. After someone leaves is a bad time to discover that a process that person owned was undocumented and is unknown by anyone else…

Timeline Photos 08/13/2021

#LeadByExample

#LeadByExample

Network/Systems Engineer | SolutionWorx, a WingSwept Company 08/12/2021

Network/Systems Engineer | SolutionWorx, a WingSwept Company

SolutionWorx, a WingSwept Company is hiring! If you are Network/Systems Engineer with a strong desire to help customers, whether that’s contributing to a major project or coming to the rescue when an unexpected need arises, we would love to hear from you.

Network/Systems Engineer | SolutionWorx, a WingSwept Company We are seeking a Network Engineer with a high level of knowledge and experience and a strong desire to help customers, whether that's contributing to a major project or coming to the rescue when an unexpected need arises.

Timeline Photos 08/11/2021

In the computer world, access privileges control what users can do on a network. Anyone with elevated privileges on your network is using the equivalent of a master key. If you hand out enough master keys, sooner or later somebody is going to misplace one. What is the 'Principle of Least Privilege'?

In the computer world, access privileges control what users can do on a network. Anyone with elevated privileges on your network is using the equivalent of a master key. If you hand out enough master keys, sooner or later somebody is going to misplace one. What is the 'Principle of Least Privilege'?

Videos (show all)

Ready For The Cyber Horror Show?
Dan Matos getting the day started with authority!  :-)
Space Shuttle Discovery on Final Approach to Dulles

Telephone

Address


4506 Daly Dr Ste 500
Chantilly, VA
20151

Opening Hours

Monday 7:30am - 6pm
Tuesday 7:30am - 6pm
Wednesday 7:30am - 6pm
Thursday 7:30am - 6pm
Friday 7:30am - 6pm
Other Engineering Services in Chantilly (show all)
River Front Services, Inc. River Front Services, Inc.
15049 Conference Center Dr., Suite130
Chantilly, 20151

River Front Services, Inc. (RFS) is a leading provider of systems engineering, computer network and cyber operations, and engineering consulting services.

Professional Design Group, Inc. Professional Design Group, Inc.
4124 Walney Road, Suite M
Chantilly, 20151

Professional Design Group, Inc. was funded in 1992, and has been providing civil engineering, planning, surveying and inspection services in DMV region.

Insight Insight
14707 Willard Rd
Chantilly, 20151

Helping engineers, developers and general contractors plan around what's underground.

Dark Apogee Designs, Inc. Dark Apogee Designs, Inc.
Chantilly, 20120

ap·o·gee: ˈThe highest point in the development of something; the climax or culmination.

Omega Engineering, LLC Omega Engineering, LLC
14399 Penrose Place, Suite 260
Chantilly, 20151

Mechanical, Electrical and Plumbing Engineering Firm

iENGINEERING Corporation iENGINEERING Corporation
24805 Pinebrook Rd, Ste 204
Chantilly, 20152

iENGINEERING Corporation

Ingenicomm Ingenicomm
14120 Parke Long Ct
Chantilly, 20151

Ingenicomm is a leading provider of ground and range equipment and enterprise engineering services for civil and commercial aerospace programs as well as the defense and intelligence communities.

Naganousa chantilly va Naganousa chantilly va
4262 Entre Ct
Chantilly, 20151

JDM performance engines Transmissions front ends front clips and parts directly imported from Japan.

TriSept TriSept
15036 Conference Center Drive Suite 500
Chantilly, 20151-1766

TriSept Corporation is a seasoned technical service provider to the space and intelligence communities.

System High Corporation System High Corporation
15059 Conference Center Dr Ste 200
Chantilly, 20151-3802

System High delivers the most advanced protection and secrecy solutions to secure and strengthen critical missions, programs, operations, and intelligence.

J2 Engineers, Inc. J2 Engineers, Inc.
4080 Lafayette Center Dr Ste 330
Chantilly, 20151

Civil Engineering, Landscape Architecture, Land Planning, Transportation and Survey

Soft Tech Consulting, Inc. Soft Tech Consulting, Inc.
4229 Lafayette Center Drive, Suite 1700
Chantilly, 20151

Soft Tech is an Innovative IT Solutions Small Business Consulting Firm based in Chantilly, VA. Learn more about us at www.softtechconsulting.com