An IT Support Blog from London

Read the latest IT news, tips and insights from IT Support pros at HTL Support

5 Things You Can Do to Prevent a Malware Outbreak in Your Network

5 Things You Can Do to Prevent a  Malware Outbreak in Your Network

An organisation’s primary and immediate line of defense against malware is typically the antivirus software installed in each of their users’ endpoint devices. It works in the background, checks data being received for known malware signatures, and warns users of possible threats. Antivirus software does contribute greatly to an organisation’s online security, but it is not enough to mitigate all malware threats when you consider how advanced these threats have become.

Continue reading
  511 Hits
511 Hits

What Goes on In the Dark Web?

Dark Web

The World Wide Web has always been a valuable source of information and a reliable means of communication to masses of users across the globe. With more than 5 billion Google searches made every day and a projected $3.5 trillion online retail sales for 2019, you’d think that the internet as we know it is already as vast as it can be.

Unknown to most people, however, is that the surface or visible web—the part of the internet which the average user can access through search engines—comprises only about 4% of the entire web. The rest is composed of the deep web, a small part of which is the oh-so-mysterious (for the curious) but essentially shady, dark web.

Continue reading
  495 Hits
495 Hits

Should Your Business Use A Password Manager

Should Your Business Use A Password Manager

Password security is a major issue that no business or enterprise can ignore. Countless hacking attempts succeed due to inadequate password security. However, remembering all those strong and (hopefully) unique passwords can be tedious, to say the least. Are password managers an alternative? Let’s take a look.

Continue reading
  781 Hits
781 Hits

7 Ways You Can Improve Security Without Breaking Your Budget

7 Ways You Can Improve Security Without Breaking Your Budget

It is easy to follow the mistaken belief that beefing up security at your business involves buying expensive hardware and software, or hiring a top-rated security consultant to step in and make major changes. In fact, it is possible to make solid security progress by simply following good practice, and by tightening protection where needed.

Making these essential improvements is important for businesses of all sizes. In 2016, the Federation of Small Businesses found that the UK’s small businesses are collectively attacked over 7 million times a year, costing up to £5.26 billion. In this article, we cover some of the most effective ways to improve resilience against these attacks without spending an arm and a leg.

Continue reading
  1065 Hits
1065 Hits

Four Reasons Why Your Company Should Use Web Content Filtering

Company should use Web Content filtering

Web content filtering is typically supplied as part of broader cybersecurity measures, with most internet security appliances offering the option to enable filtering, and many default configurations enabling it from the outset. Yet as with many topics in information security IT personnel should never assume that content filtering features are active or optimised. In this article, we outline key reasons why content filtering is still so important, and briefly describe how to enable content filtering for your organisation.

Continue reading
  974 Hits
974 Hits

5 Things You Need to Understand About Cloud Security

5 Things You Need to Understand About Cloud Security

Although cloud security is often brought up as a major issue in cloud adoption discussions, there still remain a few misconceptions that need to be corrected and clarified. In order for businesses to make the right steps in securing their cloud-based digital assets, they need to distinguish the myths from the facts. This blog post can help in that regard.

These are some of the basic things you need to understand about cloud security.

Continue reading
  1386 Hits
1386 Hits

Protecting Your Staff and Business from E-Mail Spoofing

Protecting Your Staff and Business from E-Mail Spoofing

The prevalence of firewalls and anti-virus software has closed many of the common attack vectors that cyber criminals use to gain unauthorised access to networks and to bypass online security. For this reason, attacks increasingly rely on fooling users into allowing access to systems: legitimate-looking emails that easily clear the common-sense hurdle can hide malware and well-planned hacking attacks.

Even with the necessary protections in place it is surprisingly easy to “spoof” an address, with a from field that looks correct in every way; except for the fact that the sender is not who it appears to be. Most users will think twice about opening an attachment sent by an unknown sender, but if the attachment appears to be from a colleague the usual caution is sometimes left by the wayside.

Continue reading
  1803 Hits
1803 Hits

Why is Ransomware Becoming the Favourite Attack Dog of Cyber Criminals?

Why is Ransomware Becoming the Favourite Attack Dog of Cyber Criminals?

Of all the types of malware wreaking havoc these days, one clearly stands out - Ransomware. This troublesome malware appears to be gaining a lot of fans in the cybercrime community and has, in turn, caused considerable stretches of downtime on a large number of organisations.

Continue reading
  2190 Hits
2190 Hits

This Is How A Drive By Download Sneaks Malware Into Your System

This Is How A Drive By Download Sneaks Malware Into Your System

There used to be a time when it was relatively easier to prevent malware from infecting our systems. We’d install an antivirus, keep its database updated, and equip end users with a laundry list of things to avoid - like suspicious email attachments and unfamiliar websites. Today, drive by downloads are making malware avoidance a more challenging task.

A drive-by download is a malware infection procedure that doesn’t require the user to download anything or even click a link. For his/her system to get infected, the user only has to visit a site that’s been compromised. The infection process then takes place behind the scenes, without the user ever noticing anything unusual.

Continue reading
  2239 Hits
2239 Hits

Britain Shaping Up to Confront Cyber Risks

Britain shaping up to confront cyber risks

In the wake of Brexit, it seems like there has never been a more important time to attract businesses to the UK. There are still plenty of reasons for multinationals to set up shop here. While it has experienced setbacks in recent times, London has retained its status as one of the world's financial hubs. We also have the fifth largest economy in the world according to GDP (Nominal), and despite the current uncertainty, there are still solid strategic reasons for companies basing themselves in the UK.

Continue reading
  1699 Hits
1699 Hits
Top