An IT Support Blog from London

Read the latest IT news, tips and insights from IT Support pros at HTL Support

Addressing Security Issues in the Era of Remote Working

Addressing Security Issues in the Era of Remote Working

The world continues to grapple with the long term impact of the COVID-19 pandemic, and organisations are compelled to sustain remote working arrangements for their employees. In the haste to quickly adapt to the new and evolving work environment however, it appears that one essential concern has taken a back seat: security.

IT company Hewlett-Packard recently released Blurred Lines & Blindspots—a comprehensive global study assessing organisational cyber risk in today’s remote working era, and in it, a number of worrying, albeit unsurprising, findings were revealed. Of the over 8,000 office workers surveyed:

Continue reading
  711 Hits
711 Hits

IT Security for SMEs - What Do You Need to Think About?

IT Security for SMEs

Like any other form of crime, when it comes to cybercrime, there’s always the temptation to take the view that “it would never happen to us”. However given that, every single day, more than 65,000 attempts are made to hack an SME in the UK, the risk of cybercrime is real for UK businesses – no matter their size, or their position in the market.

In this article, we outline some of the key points SMEs in the UK should think about around IT security. While most businesses would take at least some precautions, it’s nonetheless worth taking a more structured approach to IT security – even if your business is not enterprise-scale.

Continue reading
  730 Hits
730 Hits

An Update On Current Cyber Security Threats and How You Can Mitigate Them

Current Cyber Security Threats

As organisations gradually shift to the new normal, we see corresponding changes in the cybersecurity threat landscape that warrants adjustments in how businesses should frame their security strategy. While some of the older threats certainly still remain, there are a couple of new entrants that have only emerged as a byproduct of the new work environment.

Continue reading
  1224 Hits
1224 Hits

The Challenges of BYOD and Why IT Support is Crucial

The Challenges of BYOD and Why IT Support is Crucial

A good percentage of companies in London and across the globe are already implementing a Bring Your Own Device (BYOD) policy. This move has not only significantly lowered organisations’ investment in corporate devices but has also proven to be very convenient at this time when the current health crisis is propelling the rise of remote working arrangements.

It’s best to keep in mind, however, that the implementation of BYOD environments has their own set of pain points that should be seriously evaluated and addressed. To find the solution for these issues, the services of an IT support professional are vital.

Continue reading
  986 Hits
986 Hits

6 Ways to Digitally Declutter Your Business

6 Ways to Digitally Declutter Your Business

The start of a new year always brings with it the impulse to make sweeping changes around us. This often involves getting rid of things we would now classify as unusable and other stuff that have simply lost their appeal—an activity commonly referred to as decluttering.

Businesses in particular, would significantly benefit from this as it could potentially free up some office workspace and eliminate unnecessary tasks. And now that many of business activities and employees’ functions revolve around the use of technology, a digital decluttering has become as important as a physical one.

Performing a digital declutter within the organisation may simply require a few straightforward processes to be initiated by the users themselves, or may necessitate the intervention of the inhouse IT team or professional IT services. That said, here are six surefire ways to digitally declutter your company:

Continue reading
  895 Hits
895 Hits

Mobile Payments: The Benefits and Risks for Business

Globally, more and more SMEs are now integrating mobile payments into their payment options because of the ease of acceptance, and are improving sales and offering convenience to customers. This does not mean, however, that there are no downsides to adopting this technology into your business.

In this post, we go over the various factors that should help you evaluate the suitability of using the mobile payment system. But first, let’s have a clear understanding of what it is.

Continue reading
  1047 Hits
1047 Hits

The Evergreen Threats: An Update on Social Engineering Attack Schemes

Social Engineering Attack Schemes

Enterprises are well aware of threat attacks that pose a huge challenge to IT security, perpetrated by technical hackers who infiltrate computer systems to steal protected data. The truth is, however, that many of the most effective cyber-attacks are not directly inflicted upon hardware or software, but instead, are targeted on people.

Continue reading
  1833 Hits
1833 Hits

5 Things You Can Do to Prevent A Data Breach

5 Things You Can Do To Prevent A Data Breach

Data breaches can be very costly. Costs can include the usual financial consequences such as response and remediation, customer breach notification, litigation expenses, and regulatory fines, but can also include less obvious consequences such as the cost of business disruptions, loss of customer trust, and higher insurance premiums.

Clearly, it’s imperative for businesses to find ways to avoid a data breach, and here is how it can be done.

Continue reading
  1118 Hits
1118 Hits

5 Things You Can Do to Prevent a Malware Outbreak in Your Network

5 Things You Can Do to Prevent a  Malware Outbreak in Your Network

An organisation’s primary and immediate line of defense against malware is typically the antivirus software installed in each of their users’ endpoint devices. It works in the background, checks data being received for known malware signatures, and warns users of possible threats. Antivirus software does contribute greatly to an organisation’s online security, but it is not enough to mitigate all malware threats when you consider how advanced these threats have become.

Continue reading
  1576 Hits
1576 Hits

Think your VPN is Safe? Think Again.

Is your VPN safe

VPN use is widespread and for good reason: it brings large security and privacy benefits to end-users as it shields internet usage from prying eyes. But what if the VPN provider you’re using is susceptible to foreign government interference?

What if your VPN provider’s host country provides little in the way of data protection legislation? Have you considered whether the owner of your VPN service takes data security seriously at all? VPN users don’t always ask these questions – but they certainly should.

Continue reading
  1209 Hits
1209 Hits
Top