HTL Support News

Read the latest information and thinking on the world of IT Support Services.

Serverless Computing - A Primer for Decision Makers

Serverless Computing - A Primer for Decision Makers

It seems like only yesterday that cloud computing was deemed the next big thing in the business and IT landscape. Service providers scrambled to offer the best cloud services available, while organisations carefully planned how they could best make a smooth transition into the cloud environment.

Now fast forward about a decade. Cloud computing remains a game-changing technology which initiated a paradigm shift in many companies, not only in how they set up their network infrastructure but also in how they run their operations. Over time though, provisioning resources in the cloud may become a tedious and complex task for IT administrators, especially if the primary aim of a business is a faster time to market their product.

This is where serverless computing comes in.

Continue reading

Can Microsoft Workplace Analytics Transform your Workplace?

Can Microsoft Workplace Analytics Transform your Workplace

A rapidly growing pool of productivity data is aggregated by Microsoft thanks to the broad adoption of cloud productivity suites. Indeed, Office 365 is leading the field with triple the market share of its closest competitor, G Suite.

Office 365 and the Azure cloud platform is therefore a rich source of information detailing how employees conduct their daily work routine, and this has led Microsoft to launch Workplace Analytics. But who gets access to Workplace Analytics, and can it provide real insights for your business?

Continue reading

What Goes on In the Dark Web?

Dark Web

The World Wide Web has always been a valuable source of information and a reliable means of communication to masses of users across the globe. With more than 5 billion Google searches made every day and a projected $3.5 trillion online retail sales for 2019, you’d think that the internet as we know it is already as vast as it can be.

Unknown to most people, however, is that the surface or visible web—the part of the internet which the average user can access through search engines—comprises only about 4% of the entire web. The rest is composed of the deep web, a small part of which is the oh-so-mysterious (for the curious) but essentially shady, dark web.

Continue reading

Five Things an IT Security Assessment will Reveal About Your Business

IT security assessment

IT security is one of those business risks that can go under the radar until the worst happens. Businesses that do not operate in the technology arena are especially vulnerable to the consequences of the lack of IT risk assessment. Fortunately, these existential risks can be completely avoided.

What does an IT security assessment do?

In essence, IT security assessments are the actions and procedures that determine, evaluate, and then eliminate a range of vulnerabilities in technology systems and the business processes linked to those systems.

Continue reading

Disaster Recovery Myths - and How to Manage Them

Disaster recovery myths

Disaster recovery is one of those topics that isn't particularly complicated, yet is easily misunderstood. It is, nonetheless, a crucial aspect of technology management. The cost of a disaster can be tremendous, and with no fast route to recovery, an adverse event can have game-changing consequences for a business.

Getting backup and disaster recovery right is not that hard, yet 50% of UK businesses are leaving their data at risk, according to a 2018 survey. Though businesses generally make some effort to guard against disaster, plenty of disaster recovery myths persist. In this article, we tackle those myths and propose steps to ensure a reliable disaster recovery scenario.

Continue reading

Linux vs Windows - Which OS is Better?

Which operating system is better

We all love comparisons. One of the oldest comparisons or debates in the history of IT is that which pits Windows against Linux. It’s a subplot of another debate with a much wider scope: proprietary vs open source, but just as relevant for businesses.

For as long as we can recall, Windows has been the OS of choice for most businesses, especially for their PCs and laptops. Linux usage, on the other hand, has been limited to servers and a few departments in certain organisations like research agencies, startups and universities. Does this still hold true in? Let’s talk about it.

Continue reading

Reactive vs Proactive IT Support - Know the Difference

Reactive vs Proactive IT Support

When it comes to IT services, many businesses still go for the fix-it-when-it-breaks approach. And why not? They think that getting the services of an IT support company only when a problem actually arises will save them money. But does it really?

If you also think that saving your financial resources for a time when something breaks down is the right way to manage your organisation's IT ecosystem, then it's time for you to know all about reactive and proactive IT support. This should help you to determine which would work best for your business. But first, on to the definitions.

Continue reading

Benefits of SaaS vs. Traditional Licences

Benefits of SaaS vs. Traditional Licences

For many businesses, the adoption of cloud-hosted services is no longer a question, cloud provisioning is an accepted fact. As a result, Software as a Service (SaaS) has grown enormously and is now adopted widely, even at enterprise level. That said, some businesses are still operating via the traditional licencing model.

The reason for the shift to the cloud and Software as a Service is simple: the benefits of the SaaS model greatly outweigh the disadvantages. We’ve written this article to remind readers that adopting SaaS was the right choice and to encourage businesses operating a traditional model to finally make the switch.

Continue reading

How Will 5G Impact Your Business?

How Will 5G Impact Your Business

The long-awaited and much-hyped 5G network has finally launched in some markets and will be rolled out in more major cities by the second half of 2019. 5G is the fifth and latest evolution of wireless connectivity and is expected to have a transformative impact on consumers’ lives and businesses across most industries. The reason for such excitement is, of course, the high speed, low latency, better network reliability and massive device connectivity that 5G performance promises.

While faster speeds are always a welcome development for end-users, the business landscape is where 5G is anticipated to have the most impact. In fact, an Oracle-commissioned survey of 265 business leaders and IT executives across 11 countries reveals that many enterprises are well aware of the possible opportunities that 5G connectivity can create. More than 80% of the respondents say that it can significantly improve many aspects of business operations, and more than 82% believe that it can pave the way for launching new products and services.

Continue reading

Top Tips to Combat VoIP Eavesdropping

Top Tips to Combat VoIP Eavesdropping

VoIP eavesdropping is not a new cybersecurity risk. The protocol that drives most of today’s VoIP applications, Session Initiation Protocol (SIP), has been in common use since the 2000s. However, according to IBM SecurityIntelligence, attacks that exploit the SIP protocols are on the rise. Thankfully, businesses have plenty of ways to reduce the opportunities for VoIP eavesdropping. Let’s take a look.

Continue reading