Tag Archives: Information Security

XP Creates Opportunity for New Threats

As of Tuesday, April 8, 2014, Microsoft will no longer develop and release security updates or provide support for the 12 year old operating system. This is a great day for hackers. With the deadline of April 8th given out by Microsoft, they have been lying in wait for the […]

Posted in General, Information Security, Microsoft, Security | Also tagged , , , | Comments closed

Fraud Detection

Fraud-O-Meter

Businesses have many controls in place to manage assets that are the life blood of your organization. Often times, those assets can create temptation for employees. Knowing what to look out for and creating systems of checks and balances to ensure that no one person has autonomy is key. Checks […]

Posted in General, Information Security, Security, Training, Welsh Consulting Events | Also tagged , , | Comments closed

Covering the Basics – Disaster Recovery

boston fire 1

Disasters beyond our control have been affecting businesses for years. Now, technology is so entwined with our daily business activities, we often overlook our dependence on the ease of accessibility. We also tend to underestimate the importance of security and protection of those resources and information. Disaster Recovery is an important […]

Posted in Disaster Recovery, General, Security, Sustainability | Also tagged , , , , , , , | Comments closed

HFTP Presentation – Prepare and Prevent Don’t Repair and Repent

Welsh Consulting’s President, Charlie Ross, will be presenting at an upcoming educational session hosted by the New England Club Chapter of HFTP (Hospitality Financial and Technology Professionals). “Prepare and Prevent Don’t Repair and Repent” will be a discussion on Disaster Recovery and Business Continuity. Every year thousands of organizations suffer […]

Posted in Disaster Recovery, General, Information Security, Security | Also tagged , , , , | Comments closed

Covering the Basics – Email Continuity

no email

Technology is so entwined with our daily business activities, we often overlook our dependency on the tools that we use and take for granted every day. Email is one such tool that allows us to be constantly connected, regardless of where we are or what time of day it may […]

Posted in Disaster Recovery, General, Information Security, Security, Sustainability | Also tagged , , , , , , | Comments closed

Cryptolocker Ransom – Protect Yourself and Your Company

encryption

In the latest cyber attack coming to light, the industry is seeing a targeted attack on users and their files. The attacks are leaving users with personal files that have been encrypted with a private key accessible only after paying a “ransom” of $300. Given only a limited amount of […]

Posted in AntiVirus, Information Security, Security | Also tagged , , , , , | Comments closed

Event Recap – The Legal Risks of BYOD

DSC05457

Our most recent informational seminar, “The Legal Risks of BYOD”, provided participants thought provoking conversation about how to deal with the host of issues created when allowing employees to utilize their personal devices to access a company network or data. David Wilson, of Hirsch Roberts Weinstein LLP, the prestigious downtown employment […]

Posted in General, Information Security, Mobile Devices, Security, Welsh Consulting Events | Also tagged , , , , , , , , , | Comments closed

Compliance Headaches

aspirin-bottle-pills

Priorities of many companies revolve around security of their data. Compounding on top of that is the need to be up to date with any number of regulations surrounding the protection of personal data. With companies allowing employees to “bring your own device”, BYOD has leapt to the forefront of […]

Posted in Cloud Computing, General, Information Security, Mobile Devices, Security | Also tagged , , , , , | Comments closed