An IT Support Blog from London

Read the latest IT news, tips and insights from IT Support pros at HTL Support

Top Tips to Combat VoIP Eavesdropping

Top Tips to Combat VoIP Eavesdropping

VoIP eavesdropping is not a new cybersecurity risk. The protocol that drives most of today’s VoIP applications, Session Initiation Protocol (SIP), has been in common use since the 2000s. However, according to IBM SecurityIntelligence, attacks that exploit the SIP protocols are on the rise. Thankfully, businesses have plenty of ways to reduce the opportunities for VoIP eavesdropping. Let’s take a look.

Continue reading
  3825 Hits
3825 Hits

5 Big IT Trends to Watch Out For

5 Big IT Trends to Watch Out For in 2019

We saw advancements in technology that had never been witnessed. We’re talking about the explosion of voice technology such as Amazon Echo and the Google Assistant; low-code and no-code app development that has paved the way for fast, easy development of custom corporate apps; learning dexterity in robotics; successes in AI and natural language processing (NLP) that allow a machine to complete sentences, as well as other advances. And these breakthroughs are just the tip of the iceberg.

Technology for business and tech, in general, continues to advance, perhaps not as dramatically as before, but it will build on the groundwork already set. Here are the 5 big IT trends that could be hogging the headlines in the next few months.

Continue reading
  2021 Hits
2021 Hits

Three Steps to Avoiding Data Loss in Office

Three steps to avoiding data loss in Office 365

The concerns businesses have about handing data over to cloud providers have, to a large extent, been assuaged. The ongoing growth of Microsoft’s Office 365 and the general trend towards cloud computing are evidence of this. Yet, as much as cloud providers are now seen as secure, businesses still need to take steps to prevent the loss of data stored in the cloud.

In an interesting finding, Gartner suggests that through 2022, 95% of cloud security failures will be the fault of customers, not cloud service providers. As much as Office 365 is easy to adopt administrators carry a strong responsibility to maintain security. Here are three steps that can help your business secure its Office 365 data.

Continue reading
  2943 Hits
2943 Hits

Open Source Vs Proprietary - Which Type of IT Solution Is Best For Your Business

Open Source Vs Proprietary - Which Type of IT Solutions Is Best For Your Business

It’s a no-brainer. Acquire the solution that is the only solution available. Especially if you have the budget for it and its benefits are crucial to your business. However, what if there are two or more equally attractive options? Oftentimes, the options belong to one of two camps - open source and proprietary. Which one is best for your business?

It’s important to identify the advantages of each camp before you start choosing, because a lot of the problems you can encounter later on are simply due to misconceptions about these two families of software.

There are now many grey areas in the market. For example, a proprietary solution also exposes a substantial, but not total, part of its source code to the public. In this article, we’ll only be focusing our discussions on traditional open source solutions and traditional proprietary solutions.

Continue reading
  4451 Hits
4451 Hits

IT System Failure: Why Prevention Is Better Than Cure

IT System Failure: Why Prevention Is Better Than Cure

All businesses suffer when their IT systems fail. The catastrophic fallout can result in considerable income loss and comprehensive damage to reputation. Customer confidence is a precious commodity, and it will evaporate in light of an IT system failure.

Curing the symptoms of an IT failure is possible, but also time-consuming and expensive. A systems outage of even a few hours could result in months' worth of lost earnings. How much value do you place on your brand image? Your brand will suffer considerably in light of a system failure.

Continue reading
  2952 Hits
2952 Hits

Data Breaches Have Hidden Costs – Learn What They Are

Data Breaches Have Hidden Costs – Learn What They Are

Data breaches can result in dire financial repercussions for any organisation that has to deal with sensitive data, whether that be personally identifiable information (PII), personal health information (PHI), payment details, or other similar data. Depending on the number of records compromised, the costs range anywhere from tens of thousands to hundreds of millions of dollars.

The latest Ponemon study, sponsored by IBM and released in July 2018, calculates the full cost of “mega breaches” (involving more than 1 million lost records) to be $350 million. This figure takes into account the more evident cyber incident expenses such as those for technical investigation, customer breach notification and credit monitoring, regulatory fines and litigation services, among many others. The organisation would also have to cover the cost of investing additional resources into network security improvements.

Continue reading
  2670 Hits
2670 Hits

Beware the Growing Cryptocurrency Mining Malware Threat

Beware the Growing Cryptocurrency Mining Malware Threat

A new IT security threat is infecting computers across the globe, and it could be wreaking havoc on your organisation’s devices as you read this post. This malware threat uses a computer’s processing power to mine cryptocurrency, without the knowledge or consent of the owner.

Unauthorised cryptocurrency mining–or cryptojacking, as it is commonly called, is spreading like wildfire. This is not surprising, given how simple it is for cryptojacking scripts to infiltrate a computer. Hackers can initiate it using one of two methods:

Continue reading
  2809 Hits
2809 Hits

Top 10 UK Industries That Can Benefit from Big Data

Top 10 UK Industries That Can Benefit fFrom Big Data

Certain UK industries such as manufacturing, telecommunications, retail, and others who collect large volumes of data, have the potential to reap substantial benefits from Big Data analytics projects. If you really think about it, almost all industries accumulate huge amounts of data. And so it follows that practically all industries can potentially benefit.

We can’t feature every single industry here, or at least, in a single post. So, for now, let’s just focus on these 10 industries and provide brief examples or ideas on how these industries can take advantage of this relatively new trend:

Continue reading
  2814 Hits
2814 Hits

7 Ways You Can Improve Security Without Breaking Your Budget

7 Ways You Can Improve Security Without Breaking Your Budget

It is easy to follow the mistaken belief that beefing up security at your business involves buying expensive hardware and software or hiring a top-rated security consultant to step in and make major changes. In fact, it is possible to make solid security progress by simply following good practice, and by tightening protection where needed.

Making these essential improvements is important for businesses of all sizes. In 2016, the Federation of Small Businesses found that the UK’s small businesses are collectively attacked over 7 million times a year, costing up to £5.26 billion. In this article, we cover some of the most effective ways to improve resilience against these attacks without spending an arm and a leg.

Continue reading
  2536 Hits
2536 Hits

Four Reasons Why Your Company Should Use Web Content Filtering

Company should use Web Content filtering

Web content filtering is typically supplied as part of broader cybersecurity measures, with most internet security appliances offering the option to enable filtering, and many default configurations enabling it from the outset. Yet as with many topics in information security IT personnel should never assume that content filtering features are active or optimised. In this article, we outline key reasons why content filtering is still so important, and briefly describe how to enable content filtering for your organisation.

Continue reading
  4166 Hits
4166 Hits
Top