An IT Support Blog from London

Read the latest IT news, tips and insights from IT Support pros at HTL Support

No Disaster Recovery Plan? You Are Taking These 5 Serious Risks

Risks of no Disaster Recovery Plan

Disasters are by definition rare and unpredictable and therefore not front and centre when executives think about day to day operational activities. Yet an information technology disaster can strike any business, and the costs to recover from such an event can be tremendous. As with many risks, the probability of a disaster affecting your company’s information technology infrastructure can be mitigated, and so can the fallout should the worst happen. One of the best ways to reduce the damage is to have a well-designed and tested disaster recovery plan (DRP) in place.

Continue reading
  9105 Hits
9105 Hits

Hidden Costs of Not Upgrading - And What You Stand to Lose

Hidden Costs of Not Upgrading - And What You Stand to Lose

Technology expenditure is usually taken on in a reluctant manner: few businesses rush forward with adopting the latest technologies, instead deferring IT expenditure for as long as they can. Whether it is updating on-premise servers, migrating to the cloud or overhauling a creaking website – management teams tend to delay spending the funds for as long as possible. But is this wise? Are there hidden costs to squeezing the last bit of usage out of outdated technology?

Continue reading
  3666 Hits
3666 Hits

Making BYOD Safe: Policies for Your Employee's Devices

Making BYOD Safe: Policies for Your Employee's Devices

It is without question a risky affair: allowing employees to use their personal devices to access your network and valuable, often confidential company data. Yet despite the risks BYOD (bring your own device) marches on and companies and organisations around the world are adopting tactics and technologies to make it work.

Continue reading
  4055 Hits
4055 Hits

This Is How A Drive By Download Sneaks Malware Into Your System

This Is How A Drive By Download Sneaks Malware Into Your System

There used to be a time when it was relatively easier to prevent malware from infecting our systems. We’d install an antivirus, keep its database updated, and equip end users with a laundry list of things to avoid - like suspicious email attachments and unfamiliar websites. Today, drive by downloads are making malware avoidance a more challenging task.

A drive-by download is a malware infection procedure that doesn’t require the user to download anything or even click a link. For his/her system to get infected, the user only has to visit a site that’s been compromised. The infection process then takes place behind the scenes, without the user ever noticing anything unusual.

Continue reading
  4623 Hits
4623 Hits

Britain Shaping Up to Confront Cyber Risks

Britain shaping up to confront cyber risks

In the wake of Brexit, it seems like there has never been a more important time to attract businesses to the UK. There are still plenty of reasons for multinationals to set up shop here. While it has experienced setbacks in recent times, London has retained its status as one of the world's financial hubs. We also have the fifth largest economy in the world according to GDP (Nominal), and despite the current uncertainty, there are still solid strategic reasons for companies basing themselves in the UK.

Continue reading
  3098 Hits
3098 Hits

5 Hidden IT Risks that are Slowly Threatening your Business

5 Hidden IT Risks that are Slowly Threatening your Business

Information technology risks range from the very apparent to the silent and hidden. The majority of businesses mitigate the most obvious risks: only an irresponsible IT operation will do without network firewalls in place or skip on regularly updating operating systems and software. Yet it is the less obvious risks which can trip up even carefully run IT functions – and which can cause progressive or indeed sudden harm to your business.

Continue reading
  3759 Hits
3759 Hits

Help! I’ve Been Hacked: 5 next Immediate Actions

Help! I’ve been hacked: 5 next immediate actions

Data centre optimisation and consequential benefits for businesses

With so much focus on hacking and internet security, many firms of 10 - 100 people will feel that they have put a lot of effort into making their data as secure as possible. Unfortunately, internet security is a moving target, where the threat may be characterised as agile and continually evolving. Consequently, it is impossible for networks to remain impenetrable.

Standard IT best practice, such as upgrading and patching operating systems and applications, and maintaining a reliable backup and Disaster Recovery capability, are all layers that help to ensure that a firm is in a position to resume normal operations within an acceptable timeframe, should it be the victim of an attack.

Continue reading
  3685 Hits
3685 Hits

Remote Monitoring Explained: How HTL Keeps Its Finger on the Pulse of Your Systems

Remote monitoring explained: How HTL keeps its finger on the pulse of your systems

Continually reviewing your vital signs

Remote monitoring is one of the most powerful IT support tools available. Most importantly, rather than just detecting hardware and software faults in real-time, it is also able to provide the capability to predict failure.

By analysing log files created by hardware devices and active services, remote monitoring applications are able to identify events and conditions which precede failure. This is exceptionally beneficial because it frequently allows remediation of minor problems that are precursors of bigger failures.

Continue reading
  3354 Hits
Tags:
3354 Hits

How Does Business Continuity Differ from Disaster Recovery?

Business Continuity vs Disaster Recovery

Business Continuity and Disaster Recovery are almost inseparable these days. Some people even use them interchangeably. But did you know that, while they’re closely related, they’re actually not one and the same?

Knowing the difference between business continuity and disaster recovery is important. You’ll need it when you set out to address risks to your business’ availability and uptime. Will you be needing a business continuity plan? Or just a disaster recovery plan? Before seeking support from management or the board of trustees for your BC/DR project, you need to know exactly what you’re talking about.

Continue reading
  3392 Hits
3392 Hits

14 Questions to Ask Before You Renew Your IT Support Contract

14 Questions To Ask Before You Renew Your IT Support Contract

You walk into your office tomorrow. Before you can get a cup of coffee, one of your managers tells you that your IT service contract is going to expire in two months.

You've been frustrated with poor service and technology for months. Now, you have an opportunity to improve the situation. Your IT manager stands at the ready with a few recommended IT service providers. Are you equipped to sort through the options and call them?

Before you sign on the dotted line to renew your IT service contract, go through these questions. Investing an hour today could save you months of effort, risk and frustration.

Continue reading
  9251 Hits
9251 Hits
Top