Category Archives: Mobile Devices

Event Recap – The Legal Risks of BYOD


Our most recent informational seminar, “The Legal Risks of BYOD”, provided participants thought provoking conversation about how to deal with the host of issues created when allowing employees to utilize their personal devices to access a company network or data. David Wilson, of Hirsch Roberts Weinstein LLP, the prestigious downtown employment […]

Also posted in General, Information Security, Security, Welsh Consulting Events | Tagged , , , , , , , , , , | Comments closed

Compliance Headaches


Priorities of many companies revolve around security of their data. Compounding on top of that is the need to be up to date with any number of regulations surrounding the protection of personal data. With companies allowing employees to “bring your own device”, BYOD has leapt to the forefront of […]

Also posted in Cloud Computing, General, Information Security, Security | Tagged , , , , , , | Comments closed

Rogue Employees and BYOD

More and more employees are using free and accessible apps on their smartphones for work-related use and storage. While these apps can be useful, they create an additional dimension of stress when it comes to protecting confidential and company-specific data. Once again, companies are left unprotected in this area if […]

Also posted in Cloud Computing, General, Information Security, Security | Tagged , , , , , | Comments closed

Being Smart About BYOD


In today’s workplace, “bring your own device” (BYOD) is becoming more commonplace and mobile devices are turning into an accessible user interface that is turning the workforce mobile. Enabling employees to be accessible and responsive with a more flexible work environment is becoming increasingly popular. Nick Clunn, of Tech Page […]

Also posted in General, Welsh Consulting Events | Tagged , , , , , , | Comments closed

Event Recap: Workplace of the Future

Boston Skyline during Welsh Consulting Hosted Infrastructure Event

Welsh Consulting hosted an educational seminar highlighting the benefits of hosting your network infrastructure in the cloud.  Hosting services are becoming more and more prevalent in businesses of all sizes, and as the availability of hosting providers grows and matures, small businesses can take advantage of the economic gains offered. […]

Also posted in Cloud Computing, Disaster Recovery, General, Information Security, Security, Sustainability, Training, Virtualization, Welsh Consulting Events | Tagged , , , , , , , , , , | Comments closed

Why You Should Feel Insecure About Employees’ New Smartphones

For years, we helped clients procure, administer and furnish BlackBerries and other smartphones to their employees. Now, most IT departments have begun to adopt a “BYOD” (bring your own device) policy for employee smartphones. This approach allows greater flexibility and personal preference for each user, but is not without peril. […]

Also posted in AntiVirus, Information Security, Security | Tagged , , , , , , , , | Comments closed

From Androids to iPads: Protecting your company’s data


Just a few short years ago, many businesses tried to ensure data security by limiting the devices used by employees on the job. Today, with the proliferation of personal devices, trying to control usage is nearly impossible and often counter-productive. According to a March report released by IDC and Unisys, […]

Also posted in Information Security | Tagged , , , , , , , | Comments closed

Never miss your train again….

One of the most frustrating things a commuter can experience is walking down the steps of the station to the sound of the doors closing and the train pulling away.  For me, as of Friday this should never happen again.  Harnessing the technology that the MBTA has made public, several developers […]

Posted in Mobile Devices | Tagged , , , | Comments closed