An IT Support Blog from London

Read the latest IT news, tips and insights from IT Support pros at HTL Support

Addressing Security Issues in the Era of Remote Working

Addressing Security Issues in the Era of Remote Working

The world continues to grapple with the long term impact of the COVID-19 pandemic, and organisations are compelled to sustain remote working arrangements for their employees. In the haste to quickly adapt to the new and evolving work environment however, it appears that one essential concern has taken a back seat: security.

IT company Hewlett-Packard recently released Blurred Lines & Blindspots—a comprehensive global study assessing organisational cyber risk in today’s remote working era, and in it, a number of worrying, albeit unsurprising, findings were revealed. Of the over 8,000 office workers surveyed:

Continue reading
  2232 Hits
2232 Hits

An Update On Current Cyber Security Threats and How You Can Mitigate Them

Current Cyber Security Threats

As organisations gradually shift to the new normal, we see corresponding changes in the cybersecurity threat landscape that warrants adjustments in how businesses should frame their security strategy. While some of the older threats certainly still remain, there are a couple of new entrants that have only emerged as a byproduct of the new work environment.

Continue reading
  2460 Hits
2460 Hits

How To Protect Your Web Apps From Hackers

How To Protect Your Web Apps From Hackers

Readers of this blog will be intimately familiar with the way technology delivery has changed over the years. Locally-hosted server racks are history. Instead, companies rely on cloud vendors large and small to deliver essential business services via web apps – or software as a service (SaaS).

Web apps, however, bring a whole new challenge to cyber security solutions. In this article, we outline why web app security matters and what your company can do to ensure that the web apps it uses remain secure.

Continue reading
  1774 Hits
1774 Hits

Mobile Payments: The Benefits and Risks for Business

Globally, more and more SMEs are now integrating mobile payments into their payment options because of the ease of acceptance, and are improving sales and offering convenience to customers. This does not mean, however, that there are no downsides to adopting this technology into your business.

In this post, we go over the various factors that should help you evaluate the suitability of using the mobile payment system. But first, let’s have a clear understanding of what it is.

Continue reading
  2571 Hits
2571 Hits

The Evergreen Threats: An Update on Social Engineering Attack Schemes

Social Engineering Attack Schemes

Enterprises are well aware of threat attacks that pose a huge challenge to IT security, perpetrated by technical hackers who infiltrate computer systems to steal protected data. The truth is, however, that many of the most effective cyber-attacks are not directly inflicted upon hardware or software, but instead, are targeted on people.

Continue reading
  3355 Hits
3355 Hits

5 Things You Can Do to Prevent A Data Breach

5 Things You Can Do To Prevent A Data Breach

Data breaches can be very costly. Costs can include the usual financial consequences such as response and remediation, customer breach notification, litigation expenses, and regulatory fines, but can also include less obvious consequences such as the cost of business disruptions, loss of customer trust, and higher insurance premiums.

Clearly, it’s imperative for businesses to find ways to avoid a data breach, and here is how it can be done.

Continue reading
  2067 Hits
2067 Hits

5 Things You Can Do to Prevent a Malware Outbreak in Your Network

5 Things You Can Do to Prevent a  Malware Outbreak in Your Network

An organisation’s primary and immediate line of defense against malware is typically the antivirus software installed in each of their users’ endpoint devices. It works in the background, checks data being received for known malware signatures, and warns users of possible threats. Antivirus software does contribute greatly to an organisation’s online security, but it is not enough to mitigate all malware threats when you consider how advanced these threats have become.

Continue reading
  2736 Hits
2736 Hits

How Cyber Criminals Are Using Social Media To Attack Companies

How Cyber Criminals Are Using Social Media To Attack Companies

Social media is the new black and everybody wants to be part of it. Posting one’s activities, sharing one’s thoughts, and reacting to other people’s posts have simply become part of our daily lives.

But to those who know what they’re looking for, this social media content can lead to a goldmine of information. It is through this goldmine—terabytes upon terabytes of data, that cyber criminals flourish, using such data to attack individuals and even companies.

How exactly can cyber criminals use social media to compromise online security and attack business organisations? Let’s discuss their methods.

Continue reading
  2492 Hits
2492 Hits

5 Ways to Protect Your IoT Devices

5 Ways to Protect Your IoT Devices

The internet of things (IoT) is undoubtedly growing rapidly. According to Gartner the typical CIO will be looking after triple the number of IoT devices in 2023, compared to the number of IoT devices under their security remit in 2018.

This influx is caused by a mix of repurposed consumer devices, IoT devices that support infrastructure and business-specific IoT devices. Dodging the explosion of IoT devices is impossible, and yes, IoT does deliver a lot of advantages – but the security implications can be serious.

Continue reading
  15173 Hits
15173 Hits

Think your VPN is Safe? Think Again.

Is your VPN safe

VPN use is widespread and for good reason: it brings large security and privacy benefits to end-users as it shields internet usage from prying eyes. But what if the VPN provider you’re using is susceptible to foreign government interference?

What if your VPN provider’s host country provides little in the way of data protection legislation? Have you considered whether the owner of your VPN service takes data security seriously at all? VPN users don’t always ask these questions – but they certainly should.

Continue reading
  2152 Hits
2152 Hits
Top