An IT Support Blog from London

Read the latest IT news, tips and insights from IT Support pros at HTL Support

Making BYOD Safe: Policies for Your Employee's Devices

Making BYOD Safe: Policies for Your Employee's Devices

It is without question a risky affair: allowing employees to use their personal devices to access your network and valuable, often confidential company data. Yet despite the risks BYOD (bring your own device) marches on and companies and organisations around the world are adopting tactics and technologies to make it work.

Continue reading
  4426 Hits
4426 Hits

Help! I’ve Been Hacked: 5 next Immediate Actions

Help! I’ve been hacked: 5 next immediate actions

Data centre optimisation and consequential benefits for businesses

With so much focus on hacking and internet security, many firms of 10 - 100 people will feel that they have put a lot of effort into making their data as secure as possible. Unfortunately, internet security is a moving target, where the threat may be characterised as agile and continually evolving. Consequently, it is impossible for networks to remain impenetrable.

Standard IT best practice, such as upgrading and patching operating systems and applications, and maintaining a reliable backup and Disaster Recovery capability, are all layers that help to ensure that a firm is in a position to resume normal operations within an acceptable timeframe, should it be the victim of an attack.

Continue reading
  4186 Hits
4186 Hits

Why Cloud Based Disaster Recovery Is The Better Strategy

Why Cloud Based Disaster Recovery Is The Better Strategy

Companies who require high levels of availability need a reliable disaster recovery strategy. For many organisations, that usually means adhering to the 3-2-1 backup rule, where the 1 refers to keeping 1 backup copy offsite. Traditionally, that copy is stored in a dedicated, company-owned and/or managed disaster recovery infrastructure. Lately, however, businesses have started turning to cloud-based disaster recovery solutions. This article explains why that strategy is better.

What is the 3-2-1 backup rule?

The 3-2-1 backup rule is a highly recommended backup strategy that says you must:

  • Possess at least 3 copies of your data;
  • Store copies on two different kinds of storage media; and
  • Keep one of those copies offsite.
Continue reading
  4516 Hits
4516 Hits

How Accountants Improve Productivity With Cloud Services

How Accountants Improve Productivity With Cloud Services

What if your firm was asked to improve productivity by 5% this year? To achieve that level of productivity improvement, you need to know all of your options. Improving your technology capabilities by adopting cloud services is one of the best ways to improve your productivity as an accountant.

What Are Cloud Services?

Let’s take a moment to define our terms before continuing further.

Continue reading
  3933 Hits
3933 Hits

14 Questions to Ask Before You Renew Your IT Support Contract

14 Questions To Ask Before You Renew Your IT Support Contract

You walk into your office tomorrow. Before you can get a cup of coffee, one of your managers tells you that your IT service contract is going to expire in two months.

You've been frustrated with poor service and technology for months. Now, you have an opportunity to improve the situation. Your IT manager stands at the ready with a few recommended IT service providers. Are you equipped to sort through the options and call them?

Before you sign on the dotted line to renew your IT service contract, go through these questions. Investing an hour today could save you months of effort, risk and frustration.

Continue reading
  10834 Hits
10834 Hits

Shadow IT - a Threat or a Benefit?

Shadow IT - a threat or a benefit?

Acceptable practice or unacceptable risk?

Shadow IT is the practice of using technology within a business without the knowledge or approval of the IT function.

This includes anything from a single employee using a low-cost app, to an entire department, such as Project Management, adopting a cloud software application to support its Line of Business (LoB).

Continue reading
  4468 Hits
4468 Hits

Your IT Support Provider Plays a More Critical Role in Your Business than You Think

Your IT Support Provider Plays A More Critical Role In Your Business Than You Think

When you enter into a managed services agreement with an IT support provider, you’re likely driven by the potential cost savings, particularly in terms of labour costs. What you probably don’t realise is that, in addition to helping you save on costs, an IT support provider can actually play a very critical role in the success of your business.

Continue reading
  5402 Hits
5402 Hits

5 Reasons Why Our Clients Choose HTL Support to Provide Technology Services

5 reasons why our clients choose HTL Support to provide technology services

HTL Support lets clients get on with what they do best

At HTL Support, we aim to offer professional IT support services with a difference. The foundation stone of our business is to employ expert technology support technicians with good people skills. Our friendly IT Guys take the hassle out of supporting IT issues so you can get on with the thing you most desire - running your business and practicing what you do best in servicing your customers or clients.

Continue reading
  3678 Hits
3678 Hits

7 Ways Cloud Computing Will Make You a Better Accountant

7 Ways Cloud Computing Will Make You a Better Accountant

Benefits of Adopting Cloud Technology for Accounting Firms

‘’Cloud Computing’’ could be akin to a tech buzzword that has been around for years. However, unless they have been living under a digital rock, accounting firms will be aware that cloud computing has finally moved from just another buzzword to a real tool for businesses.

According to a report by Intuit, almost 80 percent of U.S. small businesses will be fully adapted to cloud computing by 2020 with an increasing number of respondents currently using it or planning to within the next two years.

Continue reading
  4325 Hits
4325 Hits

The Case for a Holistic Approach to IT Security

The case for holistic approach to IT Security

An existential threat with authorities behind the curve

The National Crime Agency didn’t pull any punches in the report Cyber Crime Assessment 2016, published by its Strategic Cyber Industry Group. The Executive Summary warned of “an existential threat to one or more major UK businesses” and that “criminal cyber capability development currently outpaces the UK’s collective response to cyber crime.”

Continue reading
  3873 Hits
3873 Hits
Top