An IT Support Blog from London

Read the latest IT news, tips and insights from IT Support pros at HTL Support

5 Things You Can Do to Prevent A Data Breach

5 Things You Can Do To Prevent A Data Breach

Data breaches can be very costly. Costs can include the usual financial consequences such as response and remediation, customer breach notification, litigation expenses, and regulatory fines, but can also include less obvious consequences such as the cost of business disruptions, loss of customer trust, and higher insurance premiums.

Clearly, it’s imperative for businesses to find ways to avoid a data breach, and here is how it can be done.

Continue reading
  2015 Hits
2015 Hits

5 Things You Can Do to Prevent a Malware Outbreak in Your Network

5 Things You Can Do to Prevent a  Malware Outbreak in Your Network

An organisation’s primary and immediate line of defense against malware is typically the antivirus software installed in each of their users’ endpoint devices. It works in the background, checks data being received for known malware signatures, and warns users of possible threats. Antivirus software does contribute greatly to an organisation’s online security, but it is not enough to mitigate all malware threats when you consider how advanced these threats have become.

Continue reading
  2668 Hits
2668 Hits

How Cyber Criminals Are Using Social Media To Attack Companies

How Cyber Criminals Are Using Social Media To Attack Companies

Social media is the new black and everybody wants to be part of it. Posting one’s activities, sharing one’s thoughts, and reacting to other people’s posts have simply become part of our daily lives.

But to those who know what they’re looking for, this social media content can lead to a goldmine of information. It is through this goldmine—terabytes upon terabytes of data, that cyber criminals flourish, using such data to attack individuals and even companies.

How exactly can cyber criminals use social media to compromise online security and attack business organisations? Let’s discuss their methods.

Continue reading
  2427 Hits
2427 Hits

5 Ways to Protect Your IoT Devices

5 Ways to Protect Your IoT Devices

The internet of things (IoT) is undoubtedly growing rapidly. According to Gartner the typical CIO will be looking after triple the number of IoT devices in 2023, compared to the number of IoT devices under their security remit in 2018.

This influx is caused by a mix of repurposed consumer devices, IoT devices that support infrastructure and business-specific IoT devices. Dodging the explosion of IoT devices is impossible, and yes, IoT does deliver a lot of advantages – but the security implications can be serious.

Continue reading
  15096 Hits
15096 Hits

Think your VPN is Safe? Think Again.

Is your VPN safe

VPN use is widespread and for good reason: it brings large security and privacy benefits to end-users as it shields internet usage from prying eyes. But what if the VPN provider you’re using is susceptible to foreign government interference?

What if your VPN provider’s host country provides little in the way of data protection legislation? Have you considered whether the owner of your VPN service takes data security seriously at all? VPN users don’t always ask these questions – but they certainly should.

Continue reading
  2086 Hits
2086 Hits

What Goes on In the Dark Web?

Dark Web

The World Wide Web has always been a valuable source of information and a reliable means of communication to masses of users across the globe. With more than 5 billion Google searches made every day and a projected $3.5 trillion online retail sales for 2019, you’d think that the internet as we know it is already as vast as it can be.

Unknown to most people, however, is that the surface or visible web—the part of the internet which the average user can access through search engines—comprises only about 4% of the entire web. The rest is composed of the deep web, a small part of which is the oh-so-mysterious (for the curious) but essentially shady, dark web.

Continue reading
  2780 Hits
2780 Hits

Five Things an IT Security Assessment will Reveal About Your Business

IT security assessment

IT security is one of those business risks that can go under the radar until the worst happens. Businesses that do not operate in the technology arena are especially vulnerable to the consequences of the lack of IT risk assessment. Fortunately, these existential risks can be completely avoided.

What does an IT security assessment do?

In essence, IT security assessments are the actions and procedures that determine, evaluate, and then eliminate a range of vulnerabilities in technology systems and the business processes linked to those systems.

Continue reading
  2339 Hits
2339 Hits

Should Your Business Use A Password Manager

Should Your Business Use A Password Manager

Password security is a major issue that no business or enterprise can ignore. Countless hacking attempts succeed due to inadequate password security. However, remembering all those strong and (hopefully) unique passwords can be tedious, to say the least. Are password managers an alternative? Let’s take a look.

Continue reading
  2457 Hits
2457 Hits

Data Breaches Have Hidden Costs – Learn What They Are

Data Breaches Have Hidden Costs – Learn What They Are

Data breaches can result in dire financial repercussions for any organisation that has to deal with sensitive data, whether that be personally identifiable information (PII), personal health information (PHI), payment details, or other similar data. Depending on the number of records compromised, the costs range anywhere from tens of thousands to hundreds of millions of dollars.

The latest Ponemon study, sponsored by IBM and released in July 2018, calculates the full cost of “mega breaches” (involving more than 1 million lost records) to be $350 million. This figure takes into account the more evident cyber incident expenses such as those for technical investigation, customer breach notification and credit monitoring, regulatory fines and litigation services, among many others. The organisation would also have to cover the cost of investing additional resources into network security improvements.

Continue reading
  2629 Hits
2629 Hits

8 Ways to Secure Your Employees’ Mobile Devices

8 Ways to Secure Your Employees Mobile Devices

In this blog, we’ve covered many of the ins and outs of BYOD (bring your own device), including the pros and cons. In reality, much of the discussion is no longer about whether employees should be allowed to connect to company networks with their own devices, BYOD is simply becoming the standard way of operating.

A study published in 2016 suggested that 59% of businesses allow BYOD, and things have certainly moved along in the intervening years. The only remaining point of discussion is BYOD cybersecurity. In this post, we give you eight top tips to help ensure BYOD does not pose a threat to your business.

Continue reading
  2044 Hits
2044 Hits
Top