An IT Support Blog from London

Read the latest IT news, tips and insights from IT Support pros at HTL Support

The 3 Insider Threats User Activity Monitoring Helps Prevent

The 3 insider threats user activity monitoring helps prevent

Insider threats: An unsavoury but unavoidable truth

When it comes to productivity and information security, insider threats are perhaps some of the most unsavoury considerations for a firm. Any business owner or senior executive would prefer to think they can implicitly trust the people that they pay but, unfortunately, it simply isn’t possible to ignore the risk of employee misbehaviour.

User Activity Monitoring (UAM) is a process that is enabled by productivity monitoring software, PMS. These applications are designed to track and record every action performed by a user. The software outputs a log file in plain English (rather than technobabble) and a video file that enables the firm to view each user’s onscreen actions.

Continue reading
  3693 Hits
3693 Hits

3 Ways Great IT Support Facilitates Fast Growth

IT Support provides effective service for businesses

Fast growth: A nice problem

Whatever the core business activity of a firm, fast growth is a nice problem to have. Although the doomsayers warn of the problems of rapid uncontrolled growth, such as resourcing gaps and overstretching with too many commitments, these are challenges that should be well within the capability of a company governed with good management practice.

Continue reading
  4706 Hits
4706 Hits

Two Factor Authentication: It Just Works!

Serviced Cloud 2 Factor Authentication

The problem with simple passwords

The issue of passwords is something of an evergreen problem for technology users. People often choose obvious, simple passwords that are easy to remember. Research has shown that a group of 10,000 words are used by 98.8% of people as passwords. This means that a hacker with software written for the purpose could automate the process of trying every one of these, something known as a ‘brute force’ attack, and would be certain of being able to hack into almost 99 out of every 100 accounts.

Continue reading
  4923 Hits
4923 Hits

5 Tell-tale Signs It’s Time to Outsource IT Support

Reasons for small and medium-sized business to outsource IT Support

If the writing isn’t quite on the wall the signs may well be there!

In many firms, IT is a tricky area. It’s complex, costly and impossible to ignore. It needs continual vigilance and good oversight to make sure it functions well. One of the biggest headaches is support.

Continue reading
  5083 Hits
5083 Hits

Myth and Mist: Dispelling 5 Key Myths About the Cloud

Cloud Computing Myths

Clarity and truth on some cloud computing myths

A lot has been said and written about cloud computing. Some is true, and some is not. Here we help to provide clarity about the subject by dispelling 5 myths about the cloud.

Myth 1: The cloud is insecure

The myth persists that the cloud is somehow insecure. In fact, the cloud is more secure because security measures in place at properly secured cloud data centres exceed those found in the vast majority of ordinary business premises.

Continue reading
  5076 Hits
5076 Hits

Why It’s Time to Sack Your Large IT Support Supplier

The problem with big companies for consumers

The problem with big companies for consumers

We’ve all been there, particularly when dealing with personal consumer affairs. We are unhappy with the service we receive from a great big company that we deal with, like a telecoms provider, an energy supplier or an e-commerce giant. We try to get the company to rectify the situation, we may often find that we are still not satisfied that the outcome is fair.

Continue reading
  4706 Hits
4706 Hits

What Does ISO27001 Accreditation Say about Your Managed Services Provider?

Serviced Cloud is ISO27001 accredited

Managed services credentials

The world is full of meanings, some explicit and some more subtle. In the language of business, there is a need to project a sense of credibility and trustworthiness. Just like qualifications and certifications are important in establishing the credentials of individuals, organisational accreditation is essential for determining the bona fides of a technology services provider.

Continue reading
  11146 Hits
11146 Hits

Cloud Versus On-site: The Undisputed

Cost advantages of Cloud Computing Solutions

Cost analysis reveals the indisputable truth

Today, boxing is a questionable sport. To many, the risk of serious injury and death to its participants simply makes it unacceptable. To some, it seems anachronistic and it does perhaps belong to a different time because it harks back to the gladiatorial spectacles of an older human civilisation.

Continue reading
  4005 Hits
4005 Hits

‘Support’ Is More Important than ‘IT’ in IT Support

'Support' is more important than 'IT' in IT Support

Greater emphasis on Support rather than IT skills

That’s a slightly provocative title for this blog. After all, there are two elements here. ‘IT’ refers to the technical bit, the ‘hard’ skills, while ‘Support’ speaks to the ‘soft’ skills of dealing with people, the context of any problem and managing it through to resolution.

For any given problem to be resolved within an acceptable time-frame requires the support person to be able to deliver on both counts equally well.

So why do we make the assertion that there is a greater emphasis on Support skills rather than IT skills?

Continue reading
  6058 Hits
6058 Hits

Cloud Versus On-site: The Facts about IT Security

Cloud Vs. On-premise: The facts about IT security

The facts about IT security

IT security is a topic of conversation that is likely to be a cause for concern for companies of all sizes. There is a perception that larger businesses have superior security, but this isn’t always true. Just ask telecoms giant TalkTalk who were hacked in 2015 and had significant amounts of data stolen, leading to some customers falling victim to fraud.

This shows that it isn’t necessarily size that determines the vulnerability of a company to an IT security breach. It’s the perceived risk, the culture of the business and the security measures that are in place. Big businesses may be at least as vulnerable as their mid-market and SMB counterparts when they don’t have the right safeguards in place.

Continue reading
  5623 Hits
5623 Hits

By accepting you will be accessing a service provided by a third-party external to https://www.htl.london/

Top