An IT Support Blog from London

Read the latest IT news, tips and insights from IT Support pros at HTL Support

Help! I’ve Been Hacked: 5 next Immediate Actions

Help! I’ve been hacked: 5 next immediate actions

Data centre optimisation and consequential benefits for businesses

With so much focus on hacking and internet security, many firms of 10 - 100 people will feel that they have put a lot of effort into making their data as secure as possible. Unfortunately, internet security is a moving target, where the threat may be characterised as agile and continually evolving. Consequently, it is impossible for networks to remain impenetrable.

Standard IT best practice, such as upgrading and patching operating systems and applications, and maintaining a reliable backup and Disaster Recovery capability, are all layers that help to ensure that a firm is in a position to resume normal operations within an acceptable timeframe, should it be the victim of an attack.

Continue reading
  4115 Hits
4115 Hits

Can Your Network Withstand the Onslaught of IoT Botnets?

Can Your Network Withstand The Onslaught Of IoT Botnets?

DDoS attacks that force websites to go offline and cripple servers are nothing new, but many of the massive DDoS attacks last year, which also happened to be the biggest in history, had a common characteristic we’ve never seen before. They all originated from hordes of zombified IoT devices, also known as IoT botnets.

Because IoT devices are here to stay, this threat won’t be going away anytime soon. If your network includes websites and other Internet-facing applications, you need to understand what these threats are, how it can impact your business, and what we in the business community can do to protect our IT infrastructures from these types of attacks.

Continue reading
  4867 Hits
4867 Hits

Why Is the Cloud More Physically Secure than On-premise Computing?

Why is the cloud more physically secure than on-premise computing?

The thing about data security…

Uncertainty about the security of the cloud has often been the deciding factor that has made some businesses retain an on-premise approach to provisioning technology to support operations.

High profile, security breaches involving large volumes of data, typically hackers stealing account and password and other personal information from online businesses, have created much doubt and distrust about the cloud, not to mention anxiety for those that have had their information stolen.

Continue reading
  3199 Hits
3199 Hits

Microsoft Invests out of Safe Harbour Wrangle but It Doesn’t Change the Right-sized Partner Rationale for Smaller Enterprises

Data Privacy Safe Harbour

Safe Harbour renegotiation by the end of January

Following the EU ruling that rendered the Safe Harbour agreement invalid last October 2015, in November Sataya Nadella (the current wearer of Bill Gates’ big Microsoft CEO shoes), announced investment in UK data centres as part of a $2bn European cloud infrastructure development plan.

Continue reading
  3249 Hits
3249 Hits

UK Data Sovereignty Assured with HTL Support Even If Microsoft Loses Battle with US Government

UK data sovereignty assured with Serviced Cloud

Microsoft refuses US government access to data stored in Ireland

Despite a court order in 2014 ruling in favour of the US government, Microsoft is refusing to hand over emails stored at a data centre in Ireland alleged to contain details of narcotics sales. The US government position supported by the court is it could force the company to hand over data it controlled and stored abroad because it is a US-based business.

Continue reading
  5266 Hits
5266 Hits
Top