An IT Support Blog from London

Read the latest IT news, tips and insights from IT Support pros at HTL Support

10 Questions to Ask When Choosing an IT Support Company

10 Questions To Ask When Choosing An IT Support Company

Choosing an IT support companyis not a decision that should be taken lightly. Bear in mind that, due to the deep dependence of modern businesses on their IT infrastructures, the choice of IT support company can make a substantial impact on business processes. In this post, we outline 10 important questions you need to ask when choosing from a list of candidates.

Continue reading
  244 Hits
244 Hits

Spotting the difference: Office 365 and Microsoft 365

Spotting the difference: Office 365 and  Microsoft 365

Cloud apps move fast, we all know that. It can be tedious to keep up with non-stop changes to cloud app portfolios, and Microsoft’s Office 365 is possibly one of the worst offenders. There are benefits, of course; it’s hard to complain about new app features that are added at no extra charge.

However, it can be challenging when tech companies re-appropriate brands that make sense in their existing format. We all know Office 365, but what exactly is Microsoft 365 and why should you bother?

Continue reading
  375 Hits
375 Hits

More Cloud Providers Are Replacing Virtual Machines with Containers - Learn Why

More Cloud Providers Are Replacing Virtual Machines with Containers - Learn Why

Cloud providers follow the direction of the market, like many other businesses. These days,  more and more companies are looking to run their cloud-based applications on containers instead of virtual machines. As a result, cloud service providers have started providing support through the appropriate tools and environments to enable their customers to run container-based applications on their cloud infrastructure.

All the major cloud providers offer some form of container support. Some examples include:

Continue reading
  392 Hits
392 Hits

HTL's Successful Visit To The Business Show This November

HTL's successful visit to the Business Show this November

HTL Support is always working towards improving the service offered to clients. Whether it's through our specialist IT knowledge or just the way in which we interact with customers, there are always lessons to be learned. One of the best ways we find to hone our skills is to get out there and meet clients face to face.

One such opportunity to do that very thing, which we like to make the most of whenever possible, is to visit industry shows. This is exactly what we did on the 16th and 17th of May this year when we visited the Business Show!

Continue reading
  280 Hits
280 Hits

Open Source Vs Proprietary - Which Type of IT Solution Is Best For Your Business

Open Source Vs Proprietary - Which Type of IT Solutions Is Best For Your Business

It’s a no-brainer. Acquire the solution that is the only solution available. Especially if you have the budget for it and its benefits are crucial to your business. However, what if there are two or more equally attractive options? Oftentimes, the options belong to one of two camps - open source and proprietary. Which one is best for your business?

It’s important to identify the advantages of each camp before you start choosing, because a lot of the problems you can encounter later on are simply due to misconceptions about these two families of software.

There are now many grey areas in the market. For example, a proprietary solution also exposes a substantial, but not total, part of its source code to the public. In this article, we’ll only be focusing our discussions on traditional open source solutions and traditional proprietary solutions.

Continue reading
  450 Hits
450 Hits

Should Your Business Use A Password Manager

Should Your Business Use A Password Manager

Password security is a major issue that no business or enterprise can ignore. Countless hacking attempts succeed due to inadequate password security. However, remembering all those strong and (hopefully) unique passwords can be tedious, to say the least. Are password managers an alternative? Let’s take a look.

Continue reading
  483 Hits
483 Hits

IT System Failure: Why Prevention Is Better Than Cure

IT System Failure: Why Prevention Is Better Than Cure

All businesses suffer when their IT systems fail. The catastrophic fallout can result in considerable income loss and comprehensive damage to reputation. Customer confidence is a precious commodity, and it will evaporate in light of an IT system failure.

Curing the symptoms of an IT failure is possible, but also time-consuming and expensive. A systems outage of even a few hours could result in months' worth of lost earnings. How much value do you place on your brand image? Your brand will suffer considerably in light of a system failure.

Continue reading
  533 Hits
533 Hits

Data Breaches Have Hidden Costs – Learn What They Are

Data Breaches Have Hidden Costs – Learn What They Are

Data breaches can result in dire financial repercussions for any organisation that has to deal with sensitive data, whether that be personally identifiable information (PII), personal health information (PHI), payment details, or other similar data. Depending on the number of records compromised, the costs range anywhere from tens of thousands to hundreds of millions of dollars.

The latest Ponemon study, sponsored by IBM and released in July 2018, calculates the full cost of “mega breaches” (involving more than 1 million lost records) to be $350 million. This figure takes into account the more evident cyber incident expenses such as those for technical investigation, customer breach notification and credit monitoring, regulatory fines and litigation services, among many others. The organisation would also have to cover the cost of investing additional resources into network security improvements.

Continue reading
  702 Hits
702 Hits

8 Ways to Secure Your Employees’ Mobile Devices

8 Ways to Secure Your Employees Mobile Devices

In this blog, we’ve covered many of the ins and outs of BYOD (bring your own device), including the pros and cons. In reality, much of the discussion is no longer about whether employees should be allowed to connect to company networks with their own devices, BYOD is simply becoming the standard way of operating.

A study published in 2016 suggested that 59% of businesses allow BYOD, and things have certainly moved along in the intervening years. The only remaining point of discussion is BYOD cybersecurity. In this post, we give you eight top tips to help ensure BYOD does not pose a threat to your business.

Continue reading
  559 Hits
559 Hits

Beware the Growing Cryptocurrency Mining Malware Threat

Beware the Growing Cryptocurrency Mining Malware Threat

A new IT security threat is infecting computers across the globe, and it could be wreaking havoc on your organisation’s devices as you read this post. This malware threat uses a computer’s processing power to mine cryptocurrency, without the knowledge or consent of the owner.

Unauthorised cryptocurrency mining–or cryptojacking, as it is commonly called, is spreading like wildfire. This is not surprising, given how simple it is for cryptojacking scripts to infiltrate a computer. Hackers can initiate it using one of two methods:

Continue reading
  877 Hits
877 Hits
Top