Category Archives: Information Security

XP Creates Opportunity for New Threats

As of Tuesday, April 8, 2014, Microsoft will no longer develop and release security updates or provide support for the 12 year old operating system. This is a great day for hackers. With the deadline of April 8th given out by Microsoft, they have been lying in wait for the […]

Also posted in General, Microsoft, Security | Tagged , , , , | Comments closed

Fraud Detection

Fraud-O-Meter

Businesses have many controls in place to manage assets that are the life blood of your organization. Often times, those assets can create temptation for employees. Knowing what to look out for and creating systems of checks and balances to ensure that no one person has autonomy is key. Checks […]

Also posted in General, Security, Training, Welsh Consulting Events | Tagged , , , | Comments closed

HFTP Presentation – Prepare and Prevent Don’t Repair and Repent

Welsh Consulting’s President, Charlie Ross, will be presenting at an upcoming educational session hosted by the New England Club Chapter of HFTP (Hospitality Financial and Technology Professionals). “Prepare and Prevent Don’t Repair and Repent” will be a discussion on Disaster Recovery and Business Continuity. Every year thousands of organizations suffer […]

Also posted in Disaster Recovery, General, Security | Tagged , , , , , | Comments closed

Covering the Basics – Email Continuity

no email

Technology is so entwined with our daily business activities, we often overlook our dependency on the tools that we use and take for granted every day. Email is one such tool that allows us to be constantly connected, regardless of where we are or what time of day it may […]

Also posted in Disaster Recovery, General, Security, Sustainability | Tagged , , , , , , , | Comments closed

Cryptolocker Ransom – Protect Yourself and Your Company

encryption

In the latest cyber attack coming to light, the industry is seeing a targeted attack on users and their files. The attacks are leaving users with personal files that have been encrypted with a private key accessible only after paying a “ransom” of $300. Given only a limited amount of […]

Also posted in AntiVirus, Security | Tagged , , , , , , | Comments closed

Event Recap – The Legal Risks of BYOD

DSC05457

Our most recent informational seminar, “The Legal Risks of BYOD”, provided participants thought provoking conversation about how to deal with the host of issues created when allowing employees to utilize their personal devices to access a company network or data. David Wilson, of Hirsch Roberts Weinstein LLP, the prestigious downtown employment […]

Also posted in General, Mobile Devices, Security, Welsh Consulting Events | Tagged , , , , , , , , , , | Comments closed

Goodbye to XP in the Workplace

microsoftwindowsxp2gn-300x219

Microsoft will cease to support Microsoft XP as of April 2014. Not surprising, there will be no new security updates, non-security hotfixes, free or paid assisted support options or online technical content updates for XP, 12 years after its initial release. The risks that are associated with continuing to operate […]

Also posted in General, Microsoft, Security | Tagged , , , , , , , | Comments closed

After the Password

passwords-now

As passwords and their requirements get longer and more difficult, they are easier to forget. New ideas and alternates to the password have been in the works for awhile. Recently, technologies and other authentication options have been joining the marketplace. From fingerprint-sensor technology, down to new types of  hardware tokens, […]

Also posted in General, Security | Tagged , , , | Comments closed