An IT Support Blog from London

Read the latest IT news, tips and insights from IT Support pros at HTL Support

How Microsoft 365 Can Keep Your Users Safe from Phishing

Microsoft 365

Microsoft 365, which encapsulates Office 365, is incredibly popular – and one of its most commonly used components is Exchange Online and Outlook – Microsoft’s online email server and desktop and mobile email client, respectively.

When it comes to email, security is a big concern – with one particular email security topic increasingly making the headlines. We’re talking about phishing, a frustratingly effective e-mail attack that’s experienced by 86% of businesses, according to the 2020 UK Cyber Security Breaches Survey.

In this article, we will outline what a phishing attack is – and explain how Microsoft 365 and its component email services can help protect your company against phishing attacks.

Continue reading
  729 Hits
729 Hits

Three Ways Your IT Support Partner Boosts Business Continuity

Three Ways Your IT Support Partner Boosts Business Continuity

Business continuity matters. It matters for profits, for client satisfaction – and for keeping you in business in the long run. Business continuity planning is an important element in ensuring continuing operations. Partnering with the right technology firm is key given how critical technology is to business operations.

In this article we will take a look at the contribution that your IT partner can make to ensuring business continuity and outline why, when looking for IT support London companies need to seek a partner that does much more than deliver technical support – why you need a partner that helps you to deliver business continuity too.

Continue reading
  694 Hits
694 Hits

An Update On Current Cyber Security Threats and How You Can Mitigate Them

Current Cyber Security Threats

As organisations gradually shift to the new normal, we see corresponding changes in the cybersecurity threat landscape that warrants adjustments in how businesses should frame their security strategy. While some of the older threats certainly still remain, there are a couple of new entrants that have only emerged as a byproduct of the new work environment.

Continue reading
  1033 Hits
1033 Hits

Introducing WPA3, And How to Improve Wi-Fi Security

Introducing WPA3 And How to Improve Wi-Fi Security

Love it or hate it, IT departments cannot prevent users from engaging with Wi-Fi networks; the convenience factor is simply too high. The IT security risks are real, however, whether your users are roaming – or using Wi-Fi where you have some control over internet security, such as the office space. It is also an evolving threat, with the gold standard of Wi-Fi security, WPA2, losing its shine. In this article, we discuss the next generation of Wi-Fi security, WPA3, and the measures you should currently be taking to boost your company’s Wi-Fi security.

Continue reading
  2079 Hits
2079 Hits

This Is What Happens When You Don’t Take DNS Security Seriously

This Is What Happens When You Don’t Take DNS Security Seriously

When businesses embark on cyber security initiatives, one of the things that’s often overlooked is DNS security. Many people forget or simply aren’t aware that a compromised DNS infrastructure (or any critical component of that infrastructure) could potentially lead to considerable downtimes, malware outbreaks, data breaches, and several other forms of cyber incidents.

These things can happen because DNS or the Domain Name System plays a crucial role in almost any user-initiated activity that takes place on the Internet. DNS is in charge of resolving the easily-recognisable names like www.somesite.com or ftp.companyx.com that users enter into their web browsers, email clients, or file transfer clients into the IP addresses (e.g. 200.100.10.10) that computers use to communicate with one another.

Continue reading
  1924 Hits
1924 Hits
Top