After the Password

passwords-now

As passwords and their requirements get longer and more difficult, they are easier to forget. New ideas and alternates to the password have been in the works for awhile. Recently, technologies and other authentication options have been joining the marketplace. From fingerprint-sensor technology, down to new types of  hardware tokens, […]

Posted in General, Information Security, Security | Tagged , , , | Comments closed

Compliance Headaches

aspirin-bottle-pills

Priorities of many companies revolve around security of their data. Compounding on top of that is the need to be up to date with any number of regulations surrounding the protection of personal data. With companies allowing employees to “bring your own device”, BYOD has leapt to the forefront of […]

Posted in Cloud Computing, General, Information Security, Mobile Devices, Security | Tagged , , , , , , | Comments closed

Rogue Employees and BYOD

More and more employees are using free and accessible apps on their smartphones for work-related use and storage. While these apps can be useful, they create an additional dimension of stress when it comes to protecting confidential and company-specific data. Once again, companies are left unprotected in this area if […]

Posted in Cloud Computing, General, Information Security, Mobile Devices, Security | Tagged , , , , , | Comments closed

Google Defends Data Mining

mining

Google has asked a judge to throw out a lawsuit claiming that it unlawfully reads people’s emails and is in violation of California’s privacy laws. This well known practice of Google’s targets its advertising based on key words that appear repeatedly in one’s inbox. Due to Google managing one privacy […]

Posted in General, Information Security, Security | Tagged , , , , | Comments closed

Being Smart About BYOD

Device_pile

In today’s workplace, “bring your own device” (BYOD) is becoming more commonplace and mobile devices are turning into an accessible user interface that is turning the workforce mobile. Enabling employees to be accessible and responsive with a more flexible work environment is becoming increasingly popular. Nick Clunn, of Tech Page […]

Posted in General, Mobile Devices, Welsh Consulting Events | Tagged , , , , , , | Comments closed

Event Recap: Workplace of the Future

Boston Skyline during Welsh Consulting Hosted Infrastructure Event

Welsh Consulting hosted an educational seminar highlighting the benefits of hosting your network infrastructure in the cloud.  Hosting services are becoming more and more prevalent in businesses of all sizes, and as the availability of hosting providers grows and matures, small businesses can take advantage of the economic gains offered. […]

Posted in Cloud Computing, Disaster Recovery, General, Information Security, Mobile Devices, Security, Sustainability, Training, Virtualization, Welsh Consulting Events | Tagged , , , , , , , , , , | Comments closed

Welsh Consulting Employees Volunteer at Local Nonprofit

Welsh Employees at Community Servings

Recently teams of Welsh Consulting employees took the afternoon off to volunteer at Community Servings, a not-for-profit food and nutrition program providing services throughout Massachusetts to individuals and families living with critical and chronic illnesses.  For the staff at Welsh Consulting, a firm providing IT strategy and support to busi­nesses in Greater […]

Posted in General, Sustainability, Welsh Consulting Events, Welsh Consulting News | Tagged , , , , | Comments closed

Welsh Consulting Acquired by Industry Veteran Charlie Ross

October 15, 2012 – Boston, MA – Welsh Consulting, an IT consulting firm providing computer services, strategy, and support to Greater Boston businesses, was recently acquired by Charlie Ross of Smithfield, Rhode Island. Ross is a 20-year veteran of IT Managed Services and worked for the last twelve years with […]

Posted in Welsh Consulting News | Comments closed