An IT Support Blog from London

Read the latest IT news, tips and insights from IT Support pros at HTL Support

Christmas and New Year IT Systems Review Checklist

Christmas and New Year IT Systems review checklist

An ideal time to catch up and set out a review

Many firms experience a pre-Christmas rush of finishing off work and projects in early and mid-December. For items in the workflow that are on-going, there is often a sense of ‘parking’ them over the Christmas - New Year transition period until the return to work in January. Many businesses are likely to have reduced workload and staffing numbers.

Continue reading
  3111 Hits
3111 Hits

IT Support Maturity Model: What’s the Right Level for Your Business?

IT Support maturity model: What’s the right level for your business

Mapping IT Support services to a maturity model

If we apply maturity modelling to the IT Support function, we are able to produce an effective mapping that overlays the five levels of a traditional maturity model with five different service levels of support.

Continue reading
  6557 Hits
6557 Hits

The 3 Insider Threats User Activity Monitoring Helps Prevent

The 3 insider threats user activity monitoring helps prevent

Insider threats: An unsavoury but unavoidable truth

When it comes to productivity and information security, insider threats are perhaps some of the most unsavoury considerations for a firm. Any business owner or senior executive would prefer to think they can implicitly trust the people that they pay but, unfortunately, it simply isn’t possible to ignore the risk of employee misbehaviour.

User Activity Monitoring (UAM) is a process that is enabled by productivity monitoring software, PMS. These applications are designed to track and record every action performed by a user. The software outputs a log file in plain English (rather than technobabble) and a video file that enables the firm to view each user’s onscreen actions.

Continue reading
  3187 Hits
3187 Hits

3 Ways Great IT Support Facilitates Fast Growth

IT Support provides effective service for businesses

Fast growth: A nice problem

Whatever the core business activity of a firm, fast growth is a nice problem to have. Although the doomsayers warn of the problems of rapid uncontrolled growth, such as resourcing gaps and overstretching with too many commitments, these are challenges that should be well within the capability of a company governed with good management practice.

Continue reading
  4050 Hits
4050 Hits

Two Factor Authentication: It Just Works!

Serviced Cloud 2 Factor Authentication

The problem with simple passwords

The issue of passwords is something of an evergreen problem for technology users. People often choose obvious, simple passwords that are easy to remember. Research has shown that a group of 10,000 words are used by 98.8% of people as passwords. This means that a hacker with software written for the purpose could automate the process of trying every one of these, something known as a ‘brute force’ attack, and would be certain of being able to hack into almost 99 out of every 100 accounts.

Continue reading
  4285 Hits
4285 Hits

5 Tell-tale Signs It’s Time to Outsource IT Support

Reasons for small and medium-sized business to outsource IT Support

If the writing isn’t quite on the wall the signs may well be there!

In many firms, IT is a tricky area. It’s complex, costly and impossible to ignore. It needs continual vigilance and good oversight to make sure it functions well. One of the biggest headaches is support.

Continue reading
  4437 Hits
4437 Hits

Cloud Versus On-site: The Facts about IT Security

Cloud Vs. On-premise: The facts about IT security

The facts about IT security

IT security is a topic of conversation that is likely to be a cause for concern for companies of all sizes. There is a perception that larger businesses have superior security, but this isn’t always true. Just ask telecoms giant TalkTalk who were hacked in 2015 and had significant amounts of data stolen, leading to some customers falling victim to fraud.

This shows that it isn’t necessarily size that determines the vulnerability of a company to an IT security breach. It’s the perceived risk, the culture of the business and the security measures that are in place. Big businesses may be at least as vulnerable as their mid-market and SMB counterparts when they don’t have the right safeguards in place.

Continue reading
  4811 Hits
4811 Hits

Can You Run Your Business from a Tablet?

IT Support for businesses in London

Tablets conquer the world in less than 7 years

Today’s tablets are powerful, flexible and handy computing devices. It’s hard to think that the first tablet to gain popular mainstream acceptance, the original Apple iPad, only debuted on April 3rd 2010.

Since then the market has exploded with devices from the big hardware manufacturers as well as those from hundreds of new market entrant brands. There are a lot of size options and the smallest 3/4G capable ones blur the line between the phone and the tablet – quite literally where does the tablet end and the smartphone begin?

Tablet computers are ubiquitous and seem to have conquered practically all markets. But can you run a business from one?

Continue reading
  4709 Hits
4709 Hits

Why Your IT Manager Needs Our Backup and Support

IT Support for IT Managers in London

The need for vital skills and expertise

One of the key HR concepts in business is to avoid person dependence. Many businesses have experienced difficulties resulting from the inability to access vital skills and expertise, from specific individuals, relied on to deliver services to clients and customers.

Continue reading
  4598 Hits
4598 Hits

How the Cloud Can Help Your Upcoming Office Move

How the Cloud can help your upcoming office move

Relocations, in any aspect of life, are a stressful undertaking, and even with careful preparation and planning, they cost time, money, and energy. When it comes to moving offices, a lot has to be taken into consideration; furniture needs to be moved or replaced, important documents and files are to be shifted securely and valuable assets have to be relocated without being damaged, all whilst keeping the business up and running and enabling employees to continue working as best as possible.

One major headache for businesses is removing their existing IT infrastructure including PCs and servers and rebuilding it at the new location as quickly as possible in order to not disrupt ongoing business too much. Many companies merely shift their old system from one office to the other when in fact they could not only move offices but also move their IT to the cloud, resulting in various business benefits and a smoother, easier relocation.

Continue reading
  4665 Hits
4665 Hits
Top