An IT Support Blog from London

Read the latest IT news, tips and insights from IT Support pros at HTL Support

More Cloud Providers Are Replacing Virtual Machines with Containers - Learn Why

More Cloud Providers Are Replacing Virtual Machines with Containers - Learn Why

Cloud providers follow the direction of the market, like many other businesses. These days,  more and more companies are looking to run their cloud-based applications on containers instead of virtual machines. As a result, cloud service providers have started providing support through the appropriate tools and environments to enable their customers to run container-based applications on their cloud infrastructure.

All the major cloud providers offer some form of container support. Some examples include:

Continue reading
  2563 Hits
2563 Hits

HTL's Successful Visit To The Business Show This November

HTL's successful visit to the Business Show this November

HTL Support is always working towards improving the service offered to clients. Whether it's through our specialist IT knowledge or just the way in which we interact with customers, there are always lessons to be learned. One of the best ways we find to hone our skills is to get out there and meet clients face to face.

One such opportunity to do that very thing, which we like to make the most of whenever possible, is to visit industry shows. This is exactly what we did on the 16th and 17th of May this year when we visited the Business Show!

Continue reading
  2001 Hits
2001 Hits

ISO 27001 and How Accreditation Boosts Customer Confidence

ISO 27001 and How Accreditation Boosts Customer Confidence

The challenges of actively managing information security are growing, and every business, regardless of size, should pro-actively protect their systems and the data held within. But how do customers know that your information security practices are fit for purpose?

Even the best intentions do not guarantee sound security practices for businesses. The only way for customers to judge the internal processes of your business is by checking for accreditation such as ISO 27001. In fact, 71% of respondents to a 2016 survey by IT Governance Ltd said that they had fielded a question about ISO 27001 accreditation.

Continue reading
  3635 Hits
3635 Hits

Going Beyond Checklists: Why Security Matters More Than Just Compliance

IT Security Compliance Checklists

With the losses associated to cybercrime expected to hit around $6 trillion by 2021, security has become a top priority of many businesses. These companies diligently implement compliance initiatives in hopes that they can ensure security within their organisations. But here’s the thing: achieving compliance doesn’t necessarily mean that your business is fundamentally secure.

Last year, Verizon published a report that revealed a major eye-opener regarding compliance. According to that report, 45% of PCI DSS certified customers needed remediation. Meaning that these businesses still needed to improve their security controls in order to be considered secure as per PCI DSS.

It’s important to note that these businesses actually already passed a previous compliance audit. In fact, they were certified to be fully PCI DSS compliant. In other words, they had already spent a considerable amount of time, attention, and money establishing IT security controls that met PCI DSS requirements.

Continue reading
  2657 Hits
2657 Hits

Three Effective Ways to Optimise Your IT Spending

Three Effective Ways to Optimise Your IT Spending

There is one area on which everyone concentrates when it comes to getting the most out of an IT budget: squeezing the supplier. Though getting commodity items at the best prices and achieving the most value out of the services and IT support costs you pay for is important, there are many other areas where careful consideration can result in far more optimal IT spending.

Deloitte’s 2016-2017 CIO survey found that, on average across all industries, expenditure on IT packages, staff, and services accounts for 3.28% of a company’s turnover, with businesses in professional services industries commonly managing annual IT budgets of 6% of overall turnover. The importance of optimal spending is clearly very high. Here we outline a few of the top areas we think your business should focus on.

Continue reading
  2874 Hits
2874 Hits

Announcement of Expansion at London IT Support Company

Announcement of Expansion at London IT Support Company

Leading IT Support Company, HTL Support, has acquired Serviced Cloud – the long-established private Cloud Company.

HTL’s recent expansion has played a key role in the Serviced Cloud merger. The two companies have worked closely together for many years in what has been described as a natural partnership, providing a bespoke service for large and small business.  The merger represents a formalizing of the business arrangements, yet will be seamless for the special relationship with customers. There has been no disclosure relating to the costs to HTL in taking Serviced Cloud under its umbrella.   

Continue reading
  160137 Hits
160137 Hits

Hidden Costs of Not Upgrading - And What You Stand to Lose

Hidden Costs of Not Upgrading - And What You Stand to Lose

Technology expenditure is usually taken on in a reluctant manner: few businesses rush forward with adopting the latest technologies, instead deferring IT expenditure for as long as they can. Whether it is updating on-premise servers, migrating to the cloud or overhauling a creaking website – management teams tend to delay spending the funds for as long as possible. But is this wise? Are there hidden costs to squeezing the last bit of usage out of outdated technology?

Continue reading
  3922 Hits
3922 Hits

Making BYOD Safe: Policies for Your Employee's Devices

Making BYOD Safe: Policies for Your Employee's Devices

It is without question a risky affair: allowing employees to use their personal devices to access your network and valuable, often confidential company data. Yet despite the risks BYOD (bring your own device) marches on and companies and organisations around the world are adopting tactics and technologies to make it work.

Continue reading
  4307 Hits
4307 Hits

Help! I’ve Been Hacked: 5 next Immediate Actions

Help! I’ve been hacked: 5 next immediate actions

Data centre optimisation and consequential benefits for businesses

With so much focus on hacking and internet security, many firms of 10 - 100 people will feel that they have put a lot of effort into making their data as secure as possible. Unfortunately, internet security is a moving target, where the threat may be characterised as agile and continually evolving. Consequently, it is impossible for networks to remain impenetrable.

Standard IT best practice, such as upgrading and patching operating systems and applications, and maintaining a reliable backup and Disaster Recovery capability, are all layers that help to ensure that a firm is in a position to resume normal operations within an acceptable timeframe, should it be the victim of an attack.

Continue reading
  4050 Hits
4050 Hits

Why Cloud Based Disaster Recovery Is The Better Strategy

Why Cloud Based Disaster Recovery Is The Better Strategy

Companies who require high levels of availability need a reliable disaster recovery strategy. For many organisations, that usually means adhering to the 3-2-1 backup rule, where the 1 refers to keeping 1 backup copy offsite. Traditionally, that copy is stored in a dedicated, company-owned and/or managed disaster recovery infrastructure. Lately, however, businesses have started turning to cloud-based disaster recovery solutions. This article explains why that strategy is better.

What is the 3-2-1 backup rule?

The 3-2-1 backup rule is a highly recommended backup strategy that says you must:

  • Possess at least 3 copies of your data;
  • Store copies on two different kinds of storage media; and
  • Keep one of those copies offsite.
Continue reading
  4326 Hits
4326 Hits
Top