An IT Support Blog from London

Read the latest IT news, tips and insights from IT Support pros at HTL Support

5 Things You Can Do to Prevent a Malware Outbreak in Your Network

5 Things You Can Do to Prevent a  Malware Outbreak in Your Network

An organisation’s primary and immediate line of defense against malware is typically the antivirus software installed in each of their users’ endpoint devices. It works in the background, checks data being received for known malware signatures, and warns users of possible threats. Antivirus software does contribute greatly to an organisation’s online security, but it is not enough to mitigate all malware threats when you consider how advanced these threats have become.

Continue reading
  108 Hits
108 Hits

How Cyber Criminals Are Using Social Media To Attack Companies

How Cyber Criminals Are Using Social Media To Attack Companies

Social media is the new black and everybody wants to be part of it. Posting one’s activities, sharing one’s thoughts, and reacting to other people’s posts have simply become part of our daily lives.

But to those who know what they’re looking for, this social media content can lead to a goldmine of information. It is through this goldmine—terabytes upon terabytes of data, that cyber criminals flourish, using such data to attack individuals and even companies.

How exactly can cyber criminals use social media to compromise online security and attack business organisations? Let’s discuss their methods.

Continue reading
  276 Hits
276 Hits

5 Ways to Protect Your IoT Devices

5 Ways to Protect Your IoT Devices

The internet of things (IoT) is undoubtedly growing rapidly. According to Gartner the typical CIO will be looking after triple the number of IoT devices in 2023, compared to the number of IoT devices under their security remit in 2018.

This influx is caused by a mix of repurposed consumer devices, IoT devices that support infrastructure and business-specific IoT devices. Dodging the explosion of IoT devices is impossible, and yes, IoT does deliver a lot of advantages – but the security implications can be serious.

Continue reading
  725 Hits
725 Hits

How AI is Reshaping VoIP and Unified Communications

How AI is reshaping VoIP

Artificial intelligence is slowly but steadily improving many of the technologies we use every day. It’s not always all that obvious that artificial intelligence is involved, and to be fair, the definition of AI is fairly broad. However intelligent computing tools are clearly here to stay – and business communications is all the better for it.

Continue reading
  345 Hits
345 Hits

Why You Should Consider Adopting a Multi-Cloud Strategy

Why You Should Consider Adopting a Multi-Cloud Strategy

Cloud solutions have revolutionised the IT industry, because they offer a lot of advantages over locally-hosted computing infrastructures. Therefore, it is no surprise that businesses have evolved their systems to allow them to migrate to a cloud environment.

A cloud-based strategy is far from perfect, however. All cloud computing vendors have, at some point failed, experienced major downtime and/or been subject to massive DDoS attacks. Dealing with any of these scenarios would have a significant negative impact on any organisation. That’s why it’s time to consider a multi-cloud strategy.

Continue reading
  416 Hits
416 Hits

Think your VPN is Safe? Think Again.

Is your VPN safe

VPN use is widespread and for good reason: it brings large security and privacy benefits to end-users as it shields internet usage from prying eyes. But what if the VPN provider you’re using is susceptible to foreign government interference?

What if your VPN provider’s host country provides little in the way of data protection legislation? Have you considered whether the owner of your VPN service takes data security seriously at all? VPN users don’t always ask these questions – but they certainly should.

Continue reading
  377 Hits
377 Hits

Serverless Computing - A Primer for Decision Makers

Serverless Computing - A Primer for Decision Makers

It seems like only yesterday that cloud computing was deemed the next big thing in the business and IT landscape. Service providers scrambled to offer the best cloud services available, while organisations carefully planned how they could best make a smooth transition into the cloud environment.

Now fast forward about a decade. Cloud computing remains a game-changing technology which initiated a paradigm shift in many companies, not only in how they set up their network infrastructure, but also in how they run their operations. Over time though, provisioning resources in the cloud may become a tedious and complex task for IT administrators, especially if the primary aim of a business is faster time to market their product.

This is where serverless computing comes in.

Continue reading
  401 Hits
401 Hits

Can Microsoft Workplace Analytics Transform your Workplace?

Can Microsoft Workplace Analytics Transform your Workplace

A rapidly growing pool of productivity data is aggregated by Microsoft thanks to the broad adoption of cloud productivity suites. Indeed, Office 365 is leading the field with triple the market share of its closest competitor, G Suite.

Office 365 and the Azure cloud platform is therefore a rich source of information detailing how employees conduct their daily work routine, and this has led Microsoft to launch Workplace Analytics. But who gets access to Workplace Analytics, and can it provide real insights for your business?

Continue reading
  464 Hits
464 Hits

What Goes on In the Dark Web?

Dark Web

The World Wide Web has always been a valuable source of information and a reliable means of communication to masses of users across the globe. With more than 5 billion Google searches made every day and a projected $3.5 trillion online retail sales for 2019, you’d think that the internet as we know it is already as vast as it can be.

Unknown to most people, however, is that the surface or visible web—the part of the internet which the average user can access through search engines—comprises only about 4% of the entire web. The rest is composed of the deep web, a small part of which is the oh-so-mysterious (for the curious) but essentially shady, dark web.

Continue reading
  417 Hits
417 Hits

Five Things an IT Security Assessment will Reveal About Your Business

IT security assessment

IT security is one of those business risks that can go under the radar until the worst happens. Businesses which do not operate in the technology arena are especially vulnerable to the consequences of the lack of IT risk assessment. Fortunately, these existential risks can be completely avoided.

What does an IT security assessment do?

In essence, IT security assessments are the actions and procedures that determine, evaluate and then eliminate a range of vulnerabilities in technology systems and the business processes linked to those systems.

Continue reading
  528 Hits
528 Hits
Top