An IT Support Blog from London

Read the latest IT news, tips and insights from IT Support pros at HTL Support

How To Protect Your Web Apps From Hackers

How To Protect Your Web Apps From Hackers

Readers of this blog will be intimately familiar with the way technology delivery has changed over the years. Locally-hosted server racks are history. Instead, companies rely on cloud vendors large and small to deliver essential business services via web apps – or software as a service (SaaS).

Web apps, however, bring a whole new challenge to cyber security solutions. In this article, we outline why web app security matters and what your company can do to ensure that the web apps it uses remain secure.

Continue reading
  431 Hits
431 Hits

The Evergreen Threats: An Update on Social Engineering Attack Schemes

Social Engineering Attack Schemes

Enterprises are well aware of threat attacks that pose a huge challenge to IT security, perpetrated by technical hackers who infiltrate computer systems to steal protected data. The truth is, however, that many of the most effective cyber-attacks are not directly inflicted upon hardware or software, but instead, are targeted on people.

Continue reading
  1030 Hits
1030 Hits

5 Things You Can Do to Prevent A Data Breach

5 Things You Can Do To Prevent A Data Breach

Data breaches can be very costly. Costs can include the usual financial consequences such as response and remediation, customer breach notification, litigation expenses, and regulatory fines, but can also include less obvious consequences such as the cost of business disruptions, loss of customer trust, and higher insurance premiums.

Clearly, it’s imperative for businesses to find ways to avoid a data breach, and here is how it can be done.

Continue reading
  905 Hits
905 Hits

5 Things You Can Do to Prevent a Malware Outbreak in Your Network

5 Things You Can Do to Prevent a  Malware Outbreak in Your Network

An organisation’s primary and immediate line of defense against malware is typically the antivirus software installed in each of their users’ endpoint devices. It works in the background, checks data being received for known malware signatures, and warns users of possible threats. Antivirus software does contribute greatly to an organisation’s online security, but it is not enough to mitigate all malware threats when you consider how advanced these threats have become.

Continue reading
  1255 Hits
1255 Hits

How Cyber Criminals Are Using Social Media To Attack Companies

How Cyber Criminals Are Using Social Media To Attack Companies

Social media is the new black and everybody wants to be part of it. Posting one’s activities, sharing one’s thoughts, and reacting to other people’s posts have simply become part of our daily lives.

But to those who know what they’re looking for, this social media content can lead to a goldmine of information. It is through this goldmine—terabytes upon terabytes of data, that cyber criminals flourish, using such data to attack individuals and even companies.

How exactly can cyber criminals use social media to compromise online security and attack business organisations? Let’s discuss their methods.

Continue reading
  1176 Hits
1176 Hits

Think your VPN is Safe? Think Again.

Is your VPN safe

VPN use is widespread and for good reason: it brings large security and privacy benefits to end-users as it shields internet usage from prying eyes. But what if the VPN provider you’re using is susceptible to foreign government interference?

What if your VPN provider’s host country provides little in the way of data protection legislation? Have you considered whether the owner of your VPN service takes data security seriously at all? VPN users don’t always ask these questions – but they certainly should.

Continue reading
  982 Hits
982 Hits

What Goes on In the Dark Web?

Dark Web

The World Wide Web has always been a valuable source of information and a reliable means of communication to masses of users across the globe. With more than 5 billion Google searches made every day and a projected $3.5 trillion online retail sales for 2019, you’d think that the internet as we know it is already as vast as it can be.

Unknown to most people, however, is that the surface or visible web—the part of the internet which the average user can access through search engines—comprises only about 4% of the entire web. The rest is composed of the deep web, a small part of which is the oh-so-mysterious (for the curious) but essentially shady, dark web.

Continue reading
  845 Hits
845 Hits

Top Tips to Combat VoIP Eavesdropping

Top Tips to Combat VoIP Eavesdropping

VoIP eavesdropping is not a new cybersecurity risk. The protocol that drives most of today’s VoIP applications, Session Initiation Protocol (SIP), has been in common use since the 2000s. However, according to IBM SecurityIntelligence, attacks that exploit the SIP protocols are on the rise. Thankfully, businesses have plenty of ways to reduce the opportunities for VoIP eavesdropping. Let’s take a look.

Continue reading
  985 Hits
985 Hits

Should Your Business Use A Password Manager

Should Your Business Use A Password Manager

Password security is a major issue that no business or enterprise can ignore. Countless hacking attempts succeed due to inadequate password security. However, remembering all those strong and (hopefully) unique passwords can be tedious, to say the least. Are password managers an alternative? Let’s take a look.

Continue reading
  1166 Hits
1166 Hits

Is Ransomware Still a Threat?

Is ransomware still a threat

The year 2017 was a dismal year for IT security, particularly in the arena of ransomware.

Less than 12 months ago, the ransomware worm WannaCry wreaked havoc across the globe, placing large organisations – including NHS trusts in England and Scotland, at the forefront of one of the most prolific cyber attacks in history. Then followed NotPetya (initially believed to be the Petya malware of 2016) in June, which also spread quickly and, even without the aid of human intervention, managed to harm multinational companies.

Yet more ransomware attacks compromised the data of individuals and organisations, but they were not nearly as high profile as the aforementioned attacks, and this prompted many people to believe that ransomware is no longer the threat that it was twelve months ago. But is this really the case?

Continue reading
  1401 Hits
1401 Hits
Top