An IT Support Blog from London

Read the latest IT news, tips and insights from IT Support pros at HTL Support

Security now: 5 on the spot IT security checks to reduce risk to your firm

On the spot IT Security checks to reduce risk to your firm

Is IT security in your firm where it needs to be?

IT security is near the top of the agenda for every executive management team. Although IT is not something executive managers are likely to get hands-on with, and is best left to qualified practitioners, there are simple spot-checks that executive leaders can make to see if basic security is being implemented.

Continue reading
605 Hits

The 3 insider threats User Activity Monitoring helps prevent

The 3 insider threats user activity monitoring helps prevent

Insider threats: An unsavoury but unavoidable truth

When it comes to productivity and information security, insider threats are perhaps some of the most unsavoury considerations for a firm. Any business owner or senior executive would prefer to think they can implicitly trust the people that they pay but, unfortunately, it simply isn’t possible to ignore the risk of employee misbehaviour.

User Activity Monitoring (UAM) is a process that is enabled by productivity monitoring software, PMS. These applications are designed to track and record every action performed by a user. The software outputs a log file in plain English (rather than technobabble) and a video file that enables the firm to view each user’s onscreen actions.

Continue reading
359 Hits

Ransomware: Increasing threat requires greater preparedness, common sense and resolution

Ransomware: Increasing threat requires greater preparedness, common sense and resolution

National publicity for council ransomware attack

In January it was nationally reported that Lincolnshire County Council (LCC) had fallen victim to a ransomware attack which rendered it unable to access systems and data for a week. Across the authority, as many as 5,000 staff had to revert to manual processes using pen and paper.

The cybercriminals had performed data ‘kidnapping’ by infecting LCC systems and encrypting the data. The data remained on the organisation’s infrastructure but was rendered inaccessible. The ransom demand for its safe release by providing the decryption key was set at the princely sum of $500 (£350).

Continue reading
695 Hits

10 ways to avoid phishing scams tricking you into revealing personal or financial information to cybercriminals

Email Security solutions to avoid phishing

Don’t fall victim…

One of the most serious risks originating from the Internet to businesses and domestic users is the threat of phishing.Phishing is a form of fraud where a cybercriminal attempts to trick the recipient of a message into revealing information such as login credentials or account information by masquerading as a reputable entity or person, typically in email, but it can be attempted through other communication channels.

A victim receives a message that appears to have been sent by a known contact or organisation. An attachment or links in the message may install malware on the recipient’s device or send them to a malicious website designed to trick them into divulging personal and financial information, such as passwords, account IDs or credit card details.

You then find your personal or business bank account has been raided or your credit cards used to purchase luxury goods. Here are 10 ways to prevent users in your business from being tricked by phishing emails.

Continue reading
Tags:
756 Hits

Proactive Warning Service: The best of health for servers and workstations!

Proactive Warning Service for Servers and Workstations

IT security and systems availability

IT security is one of the biggest concerns of our time. It might be identity theft from individuals or the hacking of business and corporate networks on an industrial scale by unscrupulous nation states trying to obtain commercial IP or military secrets. Whatever the threat, securing networks against attack is high priority for IT teams.

Besides viruses, malware and hacking, if we look at other factors that impact operational availability of business dependent IT systems, then there are a range of issues which need to be addressed.

Server status and Windows Services, disk space and database sizes are all factors that could  influence a business-critical failure. Storage and back up, the availability of network devices, satellite offices and websites are all hugely relevant.

Continue reading
804 Hits
Top