An IT Support Blog from London

Read the latest IT news, tips and insights from IT Support pros at HTL Support

Top Tips to Combat VoIP Eavesdropping

Top Tips to Combat VoIP Eavesdropping

VoIP eavesdropping is not a new cybersecurity risk. The protocol that drives most of today’s VoIP applications, Session Initiation Protocol (SIP), has been in common use since the 2000s. However, according to IBM SecurityIntelligence, attacks that exploit the SIP protocols are on the rise. Thankfully, businesses have plenty of ways to reduce the opportunities for VoIP eavesdropping. Let’s take a look.

Continue reading
  3818 Hits
3818 Hits

5 Big IT Trends to Watch Out For

5 Big IT Trends to Watch Out For in 2019

We saw advancements in technology that had never been witnessed. We’re talking about the explosion of voice technology such as Amazon Echo and the Google Assistant; low-code and no-code app development that has paved the way for fast, easy development of custom corporate apps; learning dexterity in robotics; successes in AI and natural language processing (NLP) that allow a machine to complete sentences, as well as other advances. And these breakthroughs are just the tip of the iceberg.

Technology for business and tech, in general, continues to advance, perhaps not as dramatically as before, but it will build on the groundwork already set. Here are the 5 big IT trends that could be hogging the headlines in the next few months.

Continue reading
  2015 Hits
2015 Hits

Three Steps to Avoiding Data Loss in Office

Three steps to avoiding data loss in Office 365

The concerns businesses have about handing data over to cloud providers have, to a large extent, been assuaged. The ongoing growth of Microsoft’s Office 365 and the general trend towards cloud computing are evidence of this. Yet, as much as cloud providers are now seen as secure, businesses still need to take steps to prevent the loss of data stored in the cloud.

In an interesting finding, Gartner suggests that through 2022, 95% of cloud security failures will be the fault of customers, not cloud service providers. As much as Office 365 is easy to adopt administrators carry a strong responsibility to maintain security. Here are three steps that can help your business secure its Office 365 data.

Continue reading
  2937 Hits
2937 Hits

8 Steps to Help Remote Workers Collaborate Better

8 Steps to Help Remote Workers Collaborate  Better

Working remotely is an increasing trend, with many enterprises tapping into the cost-saving benefits of remote working while employees enjoy the freedom that remote working brings. That said, remote working is still evolving, and in most companies, there is room for improvement.

According to an HR News survey, 53% of UK employees do not think that their employers are doing enough to accommodate the needs of remote workers. The solution lies partly in the managerial approach, and in part in the deployment of technology. In this article, we will cover eight tech-led approaches that can boost the collaborative experience for remote workers.

Continue reading
  2514 Hits
2514 Hits

10 Questions to Ask When Choosing an IT Support Company

10 Questions To Ask When Choosing An IT Support Company

Choosing an IT support company is not a decision that should be taken lightly. Bear in mind that, due to the deep dependence of modern businesses on their IT infrastructures, the choice of IT support company can make a substantial impact on business processes. In this post, we outline 10 important questions you need to ask when choosing from a list of candidates.

Continue reading
  3016 Hits
3016 Hits

Spotting the difference: Office 365 and Microsoft 365

Spotting the difference: Office 365 and  Microsoft 365

Cloud apps move fast, we all know that. It can be tedious to keep up with non-stop changes to cloud app portfolios, and Microsoft’s Office 365 is possibly one of the worst offenders. There are benefits, of course; it’s hard to complain about new app features that are added at no extra charge.

However, it can be challenging when tech companies re-appropriate brands that make sense in their existing format. We all know Office 365, but what exactly is Microsoft 365 and why should you bother?

Continue reading
  2581 Hits
2581 Hits

More Cloud Providers Are Replacing Virtual Machines with Containers - Learn Why

More Cloud Providers Are Replacing Virtual Machines with Containers - Learn Why

Cloud providers follow the direction of the market, like many other businesses. These days,  more and more companies are looking to run their cloud-based applications on containers instead of virtual machines. As a result, cloud service providers have started providing support through the appropriate tools and environments to enable their customers to run container-based applications on their cloud infrastructure.

All the major cloud providers offer some form of container support. Some examples include:

Continue reading
  2315 Hits
2315 Hits

HTL's Successful Visit To The Business Show This November

HTL's successful visit to the Business Show this November

HTL Support is always working towards improving the service offered to clients. Whether it's through our specialist IT knowledge or just the way in which we interact with customers, there are always lessons to be learned. One of the best ways we find to hone our skills is to get out there and meet clients face to face.

One such opportunity to do that very thing, which we like to make the most of whenever possible, is to visit industry shows. This is exactly what we did on the 16th and 17th of May this year when we visited the Business Show!

Continue reading
  1788 Hits
1788 Hits

Open Source Vs Proprietary - Which Type of IT Solution Is Best For Your Business

Open Source Vs Proprietary - Which Type of IT Solutions Is Best For Your Business

It’s a no-brainer. Acquire the solution that is the only solution available. Especially if you have the budget for it and its benefits are crucial to your business. However, what if there are two or more equally attractive options? Oftentimes, the options belong to one of two camps - open source and proprietary. Which one is best for your business?

It’s important to identify the advantages of each camp before you start choosing, because a lot of the problems you can encounter later on are simply due to misconceptions about these two families of software.

There are now many grey areas in the market. For example, a proprietary solution also exposes a substantial, but not total, part of its source code to the public. In this article, we’ll only be focusing our discussions on traditional open source solutions and traditional proprietary solutions.

Continue reading
  4445 Hits
4445 Hits

Should Your Business Use A Password Manager

Should Your Business Use A Password Manager

Password security is a major issue that no business or enterprise can ignore. Countless hacking attempts succeed due to inadequate password security. However, remembering all those strong and (hopefully) unique passwords can be tedious, to say the least. Are password managers an alternative? Let’s take a look.

Continue reading
  2502 Hits
2502 Hits

By accepting you will be accessing a service provided by a third-party external to https://www.htl.london/

Top