An IT Support Blog from London

Read the latest IT news, tips and insights from IT Support pros at HTL Support

Hidden Costs of Not Upgrading - And What You Stand to Lose

Hidden Costs of Not Upgrading - And What You Stand to Lose

Technology expenditure is usually taken on in a reluctant manner: few businesses rush forward with adopting the latest technologies, instead deferring IT expenditure for as long as they can. Whether it is updating on-premise servers, migrating to the cloud or overhauling a creaking website – management teams tend to delay spending the funds for as long as possible. But is this wise? Are there hidden costs to squeezing the last bit of usage out of outdated technology?

Continue reading
  3813 Hits
3813 Hits

This Is What Happens When You Don’t Take DNS Security Seriously

This Is What Happens When You Don’t Take DNS Security Seriously

When businesses embark on cyber security initiatives, one of the things that’s often overlooked is DNS security. Many people forget or simply aren’t aware that a compromised DNS infrastructure (or any critical component of that infrastructure) could potentially lead to considerable downtimes, malware outbreaks, data breaches, and several other forms of cyber incidents.

These things can happen because DNS or the Domain Name System plays a crucial role in almost any user-initiated activity that takes place on the Internet. DNS is in charge of resolving the easily-recognisable names like www.somesite.com or ftp.companyx.com that users enter into their web browsers, email clients, or file transfer clients into the IP addresses (e.g. 200.100.10.10) that computers use to communicate with one another.

Continue reading
  3783 Hits
3783 Hits

When Should You Choose Online Backup Over Offline Backup?

When Should You Choose Online Backup Over Offline Backup

Data backups are among the top cyber security countermeasures against ransomware, flood, fire, and other threats to data availability. As long as you have backup copies of your data, your business will have a pretty good chance of recovering from almost any major disaster. But what kind of data backup solution is the best?

It depends on your specific requirements. These days, backup solutions can be grouped into two - online backups and offline backups. Each has its own advantages and disadvantages. Knowing when to select one over the other can help you maximise your financial resources when spending on a backup solution.

Since a comprehensive comparison of these two sets of solutions can be quite long, we’ve decided to focus first on online backups. In this post, we’ll help identify situations when an online backup would be a better fit. But before we do that, let me make sure our definitions of these terms are the same.

Continue reading
  3644 Hits
3644 Hits

Why is It Better to Put Microsoft Office Online?

Why is It Better to Put Microsoft Office Online?

Like many software applications these days, Microsoft’s flagship office suite is now being offered as a cloud-based service. User files can be stored on OneDrive, making them available online. There are other online and collaboration features as well. But is Microsoft online Office really a better alternative to the on-premise MS Office we’ve all been used too? What are the possible reasons why Microsoft took this path?

Continue reading
  3929 Hits
3929 Hits

Why is Ransomware Becoming the Favourite Attack Dog of Cyber Criminals?

Why is Ransomware Becoming the Favourite Attack Dog of Cyber Criminals?

Of all the types of malware wreaking havoc these days, one clearly stands out - Ransomware. This troublesome malware appears to be gaining a lot of fans in the cybercrime community and has, in turn, caused considerable stretches of downtime on a large number of organisations.

Continue reading
  4404 Hits
4404 Hits

Making BYOD Safe: Policies for Your Employee's Devices

Making BYOD Safe: Policies for Your Employee's Devices

It is without question a risky affair: allowing employees to use their personal devices to access your network and valuable, often confidential company data. Yet despite the risks BYOD (bring your own device) marches on and companies and organisations around the world are adopting tactics and technologies to make it work.

Continue reading
  4210 Hits
4210 Hits

Virtualising Your Servers: Benefits, Advantages and Savings

Virtualising Your Servers

Server virtualisation has been a viable IT strategy for some time. Virtualisation has its origins as a technical concept in the 1960s, but it is more recently that the virtualisation of servers has become commonplace, and it is a matter of priority for many IT managers: the 2017 Spiceworks State of IT survey suggests virtualisation is at the top of the list for software investment. The reason for this is simple: by making use of virtual server hosting UK companies are saving on expenditure and seeing the implementation and management of software applications becoming much more flexible.

Continue reading
  3781 Hits
3781 Hits

Boost Your Productivity with These 5 Office 365 Tips

Boost Your Productivity with These 5 Office 365 Tips

The growth in the adoption of the Microsoft Office 365 platform is staggering. Though deeply dependent on the inertia of the eponymous desktop application suite, it is also the mix of complementary services Microsoft continuously adds which is making this particular cloud productivity platform very popular. Microsoft Office 365 hit 100 million active business users in 2017, but it is not uncommon for many businesses to merely scratch the surface of what Office 365 has to offer. Here are five ideas to help you make better use of Office 365.

Continue reading
  3281 Hits
3281 Hits

This Is How A Drive By Download Sneaks Malware Into Your System

This Is How A Drive By Download Sneaks Malware Into Your System

There used to be a time when it was relatively easier to prevent malware from infecting our systems. We’d install an antivirus, keep its database updated, and equip end users with a laundry list of things to avoid - like suspicious email attachments and unfamiliar websites. Today, drive by downloads are making malware avoidance a more challenging task.

A drive-by download is a malware infection procedure that doesn’t require the user to download anything or even click a link. For his/her system to get infected, the user only has to visit a site that’s been compromised. The infection process then takes place behind the scenes, without the user ever noticing anything unusual.

Continue reading
  4864 Hits
4864 Hits

5 Hidden IT Risks that are Slowly Threatening your Business

5 Hidden IT Risks that are Slowly Threatening your Business

Information technology risks range from the very apparent to the silent and hidden. The majority of businesses mitigate the most obvious risks: only an irresponsible IT operation will do without network firewalls in place or skip on regularly updating operating systems and software. Yet it is the less obvious risks which can trip up even carefully run IT functions – and which can cause progressive or indeed sudden harm to your business.

Continue reading
  3915 Hits
3915 Hits
Top