An IT Support Blog from London

Read the latest IT news, tips and insights from IT Support pros at HTL Support

ISO 27001 and How Accreditation Boosts Customer Confidence

ISO 27001 and How Accreditation Boosts Customer Confidence

The challenges of actively managing information security are growing, and every business, regardless of size, should pro-actively protect their systems and the data held within. But how do customers know that your information security practices are fit for purpose?

Even the best intentions do not guarantee sound security practices for businesses. The only way for customers to judge the internal processes of your business is by checking for accreditation such as ISO 27001. In fact, 71% of respondents to a 2016 survey by IT Governance Ltd said that they had fielded a question about ISO 27001 accreditation.

Continue reading
  278 Hits
278 Hits

Going Beyond Checklists: Why Security Matters More Than Just Compliance

IT Security Compliance Checklists

With the losses associated to cyber crime expected to hit around $6 trillion by 2021, security has become a top priority of many businesses. These companies diligently implement compliance initiatives in hopes that they can ensure security within their organisations. But here’s the thing: achieving compliance doesn’t necessarily mean that your business is fundamentally secure.

Last year, Verizon published a report that revealed a major eye opener regarding compliance. According to that report, 45% of PCI DSS certified customers needed remediation. Meaning that these businesses still needed to improve their security controls in order to be considered secure as per PCI DSS.

It’s important to note that these businesses actually already passed a previous compliance audit. In fact, they were certified to be fully PCI DSS compliant. In other words, they had already spent a considerable amount of time, attention, and money establishing IT security controls that met PCI DSS requirements.

Continue reading
  543 Hits
543 Hits

Three Effective Ways to Optimise Your IT Spending

Three Effective Ways to Optimise Your IT Spending

There is one area on which everyone concentrates when it comes to getting the most out of an IT budget: squeezing the supplier. Though getting commodity items at the best prices and achieving the most value out of the services and IT support costs you pay for is important, there are many other areas where careful consideration can result in far more optimal IT spending.

Deloitte’s 2016-2017 CIO survey found that, on average across all industries, expenditure on IT packages, staff and services accounts for 3.28% of a company’s turnover, with businesses in professional services industries commonly managing annual IT budgets of 6% of overall turnover. The importance of optimal spending is clearly very high. Here we outline a few of the top areas we think your business should focus on.

Continue reading
  761 Hits
761 Hits

Announcement of Expansion at London IT Support Company

Announcement of Expansion at London IT Support Company

Leading IT Support Company, HTL Support, has acquired Serviced Cloud – the long-established private Cloud Company.

HTL’s recent expansion has played a key role in the Serviced Cloud merger. The two companies have worked closely together for many years in what has been described as a natural partnership, providing a bespoke service for large and small business.  The merger represents a formalizing of the business arrangements, yet will be seamless for the special relationship with customers. There has been no disclosure relating to the costs to HTL in taking Serviced Cloud under its umbrella.   

Continue reading
  84843 Hits
84843 Hits

Hidden Costs of Not Upgrading - And What You Stand to Lose

Hidden Costs of Not Upgrading - And What You Stand to Lose

Technology expenditure is usually taken on in a reluctant manner: few businesses rush forward with adopting the latest technologies, instead deferring IT expenditure for as long as they can. Whether it is updating on-premise servers, migrating to the cloud or overhauling a creaking website – management teams tend to delay spending the funds for as long as possible. But is this wise? Are there hidden costs to squeezing the last bit of usage out of outdated technology?

Continue reading
  1205 Hits
1205 Hits

Making BYOD Safe: Policies for Your Employee's Devices

Making BYOD Safe: Policies for Your Employee's Devices

It is without question a risky affair: allowing employees to use their personal devices to access your network and valuable, often confidential company data. Yet despite the risks BYOD (bring your own device) marches on and companies and organisations around the world are adopting tactics and technologies to make it work.

Continue reading
  1037 Hits
1037 Hits

Help! I’ve been hacked: 5 next immediate actions

Help! I’ve been hacked: 5 next immediate actions

Data centre optimisation and consequential benefits for businesses

With so much focus on hacking and internet security, many firms of 10 - 100 people will feel that they have put a lot of effort into making their data as secure as possible. Unfortunately, internet security is a moving target, where the threat may be characterised as agile and continually evolving. Consequently, it is impossible for networks to remain impenetrable.

Standard IT best practice, such as upgrading and patching operating systems and applications, and maintaining a reliable backup and Disaster Recovery capability, are all layers that help to ensure that a firm is in a position to resume normal operations within an acceptable timeframe, should it be the victim of an attack.

Continue reading
  609 Hits
609 Hits

Why Cloud Based Disaster Recovery Is The Better Strategy

Why Cloud Based Disaster Recovery Is The Better Strategy

Companies who require high levels of availability need a reliable disaster recovery strategy. For many organisations, that usually means adhering to the 3-2-1 backup rule, where the 1 refers to keeping 1 backup copy offsite. Traditionally, that copy is stored in a dedicated, company-owned and/or managed disaster recovery infrastructure. Lately, however, businesses have started turning to cloud-based disaster recovery solutions. This article explains why that strategy is better.

What is the 3-2-1 backup rule?

The 3-2-1 backup rule is a highly recommended backup strategy that says you must:

  • Possess at least 3 copies of your data;
  • Store copies on two different kinds of storage media; and
  • Keep one of those copies offsite.
Continue reading
  948 Hits
948 Hits

How Accountants Improve Productivity With Cloud Services

How Accountants Improve Productivity With Cloud Services

What if your firm was asked to improve productivity by 5% this year? To achieve that level of productivity improvement, you need to know all of your options. Improving your technology capabilities by adopting cloud services is one of the best ways to improve your productivity as an accountant.

What Are Cloud Services?

Let’s take a moment to define our terms before continuing further.

Continue reading
  797 Hits
797 Hits

14 Questions To Ask Before You Renew Your IT Support Contract

14 Questions To Ask Before You Renew Your IT Support Contract

You walk into your office tomorrow. Before you can get a cup of coffee, one of your managers tells you that your IT service contract is going to expire in two months.

You’ve been frustrated with poor service and technology for months. Now, you have an opportunity to improve the situation. Your IT manager stands at the ready with a few recommended IT service providers. Are you equipped to sort through the options and call them?

Before you sign on the dotted line to renew your IT service contract, go through these questions. Investing an hour today could save you months of effort, risk and frustration.

Continue reading
  1467 Hits
1467 Hits
Top