Covering the Basics – Disaster Recovery

boston fire 1

Disasters beyond our control have been affecting businesses for years. Now, technology is so entwined with our daily business activities, we often overlook our dependence on the ease of accessibility. We also tend to underestimate the importance of security and protection of those resources and information. Disaster Recovery is an important […]

Posted in Disaster Recovery, General, Security, Sustainability | Tagged , , , , , , , , | Comments closed

HFTP Presentation – Prepare and Prevent Don’t Repair and Repent

Welsh Consulting’s President, Charlie Ross, will be presenting at an upcoming educational session hosted by the New England Club Chapter of HFTP (Hospitality Financial and Technology Professionals). “Prepare and Prevent Don’t Repair and Repent” will be a discussion on Disaster Recovery and Business Continuity. Every year thousands of organizations suffer […]

Posted in Disaster Recovery, General, Information Security, Security | Tagged , , , , , | Comments closed

Event Recap – Do You Hear What I Hear?

DCS08946-crop

At our latest informational seminar, “Do You Hear What I Hear?“, attendees were engaged in activities and discussions revolving around the never-ending generational debate and stereotypes that we all harbor. Kari Heistad of Culture Coach International (CCI) delivered a powerful presentation highlighting the unique characteristics of our generations and how […]

Posted in General, Sustainability, Training, Welsh Consulting Events | Comments closed

Covering the Basics – Email Continuity

no email

Technology is so entwined with our daily business activities, we often overlook our dependency on the tools that we use and take for granted every day. Email is one such tool that allows us to be constantly connected, regardless of where we are or what time of day it may […]

Posted in Disaster Recovery, General, Information Security, Security, Sustainability | Tagged , , , , , , , | Comments closed

Upcoming Welsh Event – Mark Your Calendar

can to phone 2

Join Welsh Consulting on January 14, 2014 at the Harvard Club Downtown for the next edition in our information series. “Do You Hear What I Hear? – Communication and Technology Across the Generational Divide” will be the topic of presentation and discussion. Breakfast and networking will be hosted at the Harvard Club […]

Posted in General, Sustainability, Training, Welsh Consulting Events | Tagged , , , , , , , , | Comments closed

Cryptolocker Ransom – Protect Yourself and Your Company

encryption

In the latest cyber attack coming to light, the industry is seeing a targeted attack on users and their files. The attacks are leaving users with personal files that have been encrypted with a private key accessible only after paying a “ransom” of $300. Given only a limited amount of […]

Posted in AntiVirus, Information Security, Security | Tagged , , , , , , | Comments closed

Event Recap – The Legal Risks of BYOD

DSC05457

Our most recent informational seminar, “The Legal Risks of BYOD”, provided participants thought provoking conversation about how to deal with the host of issues created when allowing employees to utilize their personal devices to access a company network or data. David Wilson, of Hirsch Roberts Weinstein LLP, the prestigious downtown employment […]

Posted in General, Information Security, Mobile Devices, Security, Welsh Consulting Events | Tagged , , , , , , , , , , | Comments closed

Goodbye to XP in the Workplace

microsoftwindowsxp2gn-300x219

Microsoft will cease to support Microsoft XP as of April 2014. Not surprising, there will be no new security updates, non-security hotfixes, free or paid assisted support options or online technical content updates for XP, 12 years after its initial release. The risks that are associated with continuing to operate […]

Posted in General, Information Security, Microsoft, Security | Tagged , , , , , , , | Comments closed