An IT Support Blog from London

Read the latest IT news, tips and insights from IT Support pros at HTL Support

Five Things an IT Security Assessment will Reveal About Your Business

IT security assessment

IT security is one of those business risks that can go under the radar until the worst happens. Businesses which do not operate in the technology arena are especially vulnerable to the consequences of the lack of IT risk assessment. Fortunately, these existential risks can be completely avoided.

What does an IT security assessment do?

In essence, IT security assessments are the actions and procedures that determine, evaluate and then eliminate a range of vulnerabilities in technology systems and the business processes linked to those systems.

Continue reading
  529 Hits
529 Hits

Disaster Recovery Myths - and How to Manage Them

Disaster recovery myths

Disaster recovery is one of those topics that isn't particularly complicated, yet is easily misunderstood. It is, nonetheless, a crucial aspect of technology management. The cost of a disaster can be tremendous, and with no fast route to recovery, an adverse event can have game-changing consequences for a business.

Getting backup and disaster recovery right is not that hard, yet 50% of UK businesses are leaving their data at risk, according to a 2018 survey. Though businesses generally make some effort to guard against disaster, plenty of disaster recovery myths persist. In this article, we tackle those myths and propose steps to ensure a reliable disaster recovery scenario.

Continue reading
  476 Hits
476 Hits

Linux vs Windows - Which OS is Better in 2019?

Which operating system is better

We all love comparisons. One of the oldest comparisons or debates in the history of IT is that which pits Windows against Linux. It’s a subplot of another debate with a much wider scope: proprietary vs open source, but just as relevant for businesses.

For as long as we can recall, Windows has been the OS of choice for most businesses, especially for their PCs and laptops. Linux usage, on the other hand, has been limited to servers and a few departments in certain organisations like research agencies, startups and universities. Does this still hold true in 2019? Let’s talk about it.

Continue reading
  367 Hits
367 Hits

10 Questions to Ask When Choosing an IT Support Company

10 Questions To Ask When Choosing An IT Support Company

Choosing an IT support company is not a decision that should be taken lightly. Bear in mind that, due to the deep dependence of modern businesses on their IT infrastructures, the choice of IT support company can make a substantial impact on business processes. In this post, we outline 10 important questions you need to ask when choosing from a list of candidates.

Continue reading
  1169 Hits
1169 Hits

Open Source Vs Proprietary - Which Type of IT Solution Is Best For Your Business

Open Source Vs Proprietary - Which Type of IT Solutions Is Best For Your Business

It’s a no-brainer. Acquire the solution that is the only solution available. Especially if you have the budget for it and its benefits are crucial to your business. However, what if there are two or more equally attractive options? Oftentimes, the options belong to one of two camps - open source and proprietary. Which one is best for your business?

It’s important to identify the advantages of each camp before you start choosing, because a lot of the problems you can encounter later on are simply due to misconceptions about these two families of software.

There are now many grey areas in the market. For example, a proprietary solution also exposes a substantial, but not total, part of its source code to the public. In this article, we’ll only be focusing our discussions on traditional open source solutions and traditional proprietary solutions.

Continue reading
  871 Hits
871 Hits

Beware the Growing Cryptocurrency Mining Malware Threat

Beware the Growing Cryptocurrency Mining Malware Threat

A new IT security threat is infecting computers across the globe, and it could be wreaking havoc on your organisation’s devices as you read this post. This malware threat uses a computer’s processing power to mine cryptocurrency, without the knowledge or consent of the owner.

Unauthorised cryptocurrency mining–or cryptojacking, as it is commonly called, is spreading like wildfire. This is not surprising, given how simple it is for cryptojacking scripts to infiltrate a computer. Hackers can initiate it using one of two methods:

Continue reading
  1167 Hits
1167 Hits

5 Office 365 Features That Can Help You Maintain GDPR Compliance

5 Office 365 Features That Can Help You Maintain GDPR Compliance

We all witnessed the flurry of activity that led up to May 25, 2018; the date on which GDPR became enforceable. Organisations and businesses of all types made a gargantuan effort to ensure compliance. However, GDPR compliance is not a one-off effort.

GDPR compliance involves ongoing, but difficult to enforce, habits covering the responsible use and the protection of your customer data. Most resource-pressed businesses will benefit from whatever resources are available. Enter Office 365.

Continue reading
  1112 Hits
1112 Hits

When Would You Need an IT Audit?

When Would You Need an IT Audit

With the onset of new technologies, most organisations have come to rely heavily on their IT practices and systems to ensure that operations are carried out with utmost efficiency. But how do corporate executives and business owners know that their IT system is effectively contributing to the company's business objectives?

The careful consideration given to the acquisition of software assets or the upgrade of IT infrastructure is justified. However, less attention is devoted to evaluating if these investments are actually providing a positive return for the company. Perhaps more important than ascertaining whether IT resources are properly leveraged, is to ensure that the enterprise's IT systems are reliable and secure enough to maintain the integrity of the company's data and information assets. 

Continue reading
  1005 Hits
1005 Hits

ISO 27001 and How Accreditation Boosts Customer Confidence

ISO 27001 and How Accreditation Boosts Customer Confidence

The challenges of actively managing information security are growing, and every business, regardless of size, should pro-actively protect their systems and the data held within. But how do customers know that your information security practices are fit for purpose?

Even the best intentions do not guarantee sound security practices for businesses. The only way for customers to judge the internal processes of your business is by checking for accreditation such as ISO 27001. In fact, 71% of respondents to a 2016 survey by IT Governance Ltd said that they had fielded a question about ISO 27001 accreditation.

Continue reading
  933 Hits
933 Hits

Four Reasons Why Your Company Should Use Web Content Filtering

Company should use Web Content filtering

Web content filtering is typically supplied as part of broader cybersecurity measures, with most internet security appliances offering the option to enable filtering, and many default configurations enabling it from the outset. Yet as with many topics in information security IT personnel should never assume that content filtering features are active or optimised. In this article, we outline key reasons why content filtering is still so important, and briefly describe how to enable content filtering for your organisation.

Continue reading
  933 Hits
933 Hits
Top