An IT Support Blog from London

Read the latest IT news, tips and insights from IT Support pros at HTL Support

Help! I’ve been hacked: 5 next immediate actions

Help! I’ve been hacked: 5 next immediate actions

Data centre optimisation and consequential benefits for businesses

With so much focus on hacking and internet security, many firms of 10 - 100 people will feel that they have put a lot of effort into making their data as secure as possible. Unfortunately, internet security is a moving target, where the threat may be characterised as agile and continually evolving. Consequently, it is impossible for networks to remain impenetrable.

Standard IT best practice, such as upgrading and patching operating systems and applications, and maintaining a reliable backup and Disaster Recovery capability, are all layers that help to ensure that a firm is in a position to resume normal operations within an acceptable timeframe, should it be the victim of an attack.

Continue reading
  1515 Hits
1515 Hits

Remote monitoring explained: How HTL keeps its finger on the pulse of your systems

Remote monitoring explained: How HTL keeps its finger on the pulse of your systems

Continually reviewing your vital signs

Remote monitoring is one of the most powerful IT support tools available. Most importantly , rather than just detecting hardware and software faults in real time, it is also able to provide the capability to predict failure.

By analysing log files created by hardware devices and active services, remote monitoring applications are able to identify events and conditions which precede failure. This is exceptionally beneficial, because it frequently allows remediation of minor problems that are precursors of bigger failures.

Continue reading
  1802 Hits
Tags:
1802 Hits

How Does Business Continuity Differ from Disaster Recovery?

Business Continuity vs Disaster Recovery

Business Continuity and Disaster Recovery are almost inseparable these days. Some people even use them interchangeably. But did you know that, while they’re closely related, they’re actually not one and the same?

Knowing the difference between business continuity and disaster recovery is important. You’ll need it when you set out to address risks to your business’ availability and uptime. Will you be needing a business continuity plan? Or just a disaster recovery plan? Before seeking support from management or the board of trustees for your BC/DR project, you need to know exactly what you’re talking about.

Continue reading
  1778 Hits
1778 Hits

14 Questions to Ask Before You Renew Your IT Support Contract

14 Questions To Ask Before You Renew Your IT Support Contract

You walk into your office tomorrow. Before you can get a cup of coffee, one of your managers tells you that your IT service contract is going to expire in two months.

You've been frustrated with poor service and technology for months. Now, you have an opportunity to improve the situation. Your IT manager stands at the ready with a few recommended IT service providers. Are you equipped to sort through the options and call them?

Before you sign on the dotted line to renew your IT service contract, go through these questions. Investing an hour today could save you months of effort, risk and frustration.

Continue reading
  2888 Hits
2888 Hits

Shadow IT - a Threat or a Benefit?

Shadow IT - a threat or a benefit?

Acceptable practice or unacceptable risk?

Shadow IT is the practice of using technology within a business without the knowledge or approval of the IT function.

This includes anything from a single employee using a low-cost app, to an entire department, such as Project Management, adopting a cloud software application to support its Line of Business (LoB).

Continue reading
  1840 Hits
1840 Hits

Your IT Support Provider Plays a More Critical Role in Your Business than You Think

Your IT Support Provider Plays A More Critical Role In Your Business Than You Think

When you enter into a managed services agreement with an IT support provider, you’re likely driven by the potential cost savings, particularly in terms of labour costs. What you probably don’t realise is that, in addition to helping you save on costs, an IT support provider can actually play a very critical role in the success of your business.

Continue reading
  2364 Hits
2364 Hits

Can Your Network Withstand the Onslaught of IoT Botnets?

Can Your Network Withstand The Onslaught Of IoT Botnets?

DDoS attacks that force websites to go offline and cripple servers are nothing new, but many of the massive DDoS attacks last year, which also happened to be the biggest in history, had a common characteristic we’ve never seen before. They all originated from hordes of zombified IoT devices, also known as IoT botnets.

Because IoT devices are here to stay, this threat won’t be going away anytime soon. If your network includes websites and other Internet-facing applications, you need to understand what these threats are, how it can impact your business, and what we in the business community can do to protect our IT infrastructures from these types of attacks.

Continue reading
  2007 Hits
2007 Hits

5 Reasons Why Our Clients Choose HTL Support to Provide Technology Services

5 reasons why our clients choose HTL Support to provide technology services

HTL Support lets clients get on with what they do best

At HTL Support, we aim to offer professional IT support services with a difference. The foundation stone of our business is to employ expert technology support technicians with good people skills. Our friendly IT Guys take the hassle out of supporting IT issues so you can get on with the thing you most desire - running your business and practicing what you do best in servicing your customers or clients.

Continue reading
  1856 Hits
1856 Hits

Security Now: 5 on the Spot IT Security Checks to Reduce Risk to Your Firm

On the spot IT Security checks to reduce risk to your firm

Is IT security in your firm where it needs to be?

IT security is near the top of the agenda for every executive management team. Although IT is not something executive managers are likely to get hands-on with and is best left to qualified practitioners, there are simple spot-checks that executive leaders can make to see if basic security is being implemented.

Continue reading
  2025 Hits
2025 Hits

How to recover from a data loss disaster in 20 minutes…

How to recover from a data loss disaster in 20 minutes

Lies, damned lies, and statistics…

For many years, the IT industry has used the threat of going out of business as a way of compelling businesses to invest in backup and Disaster Recovery solutions. Essentially, there has been more than a little scaremongering about the risk of failing to back up data properly and putting appropriate plans in place for disaster recovery.

Continue reading
  1801 Hits
1801 Hits
Top