An IT Support Blog from London

Read the latest IT news, tips and insights from IT Support pros at HTL Support

Enjoy the efficiency of hosted desktop with the performance graphics application users need

Hosted Desktop Graphics performance with NVIDIA GRID

Hosted Desktop Now available to firms with heavy graphics demands.

Hosted desktop offers significant benefits to businesses of all types and sizes. Business applications are in the cloud, hosted on our servers in the data centre. Using laptops, PCs, tablets or thin clients, each user’s computing desktop is delivered through a business-class Internet connection.

Continue reading
  1554 Hits
1554 Hits

3 reasons recruiters do it better in the cloud

3 reasons recruiters do it better in the cloud

Flexible, secure and cost effective: What are you waiting for?!

Businesses of all types are able to benefit from cloud computing. However, some of the advantages lend themselves particularly well to certain aspects which characterise the recruitment sector. They simply map on to the needs of recruitment business much better than an on-premise approach to provisioning technology for a recruitment business. Here, we outline three of them.

Continue reading
  1621 Hits
1621 Hits

How to recover from a data loss disaster in 20 minutes…

How to recover from a data loss disaster in 20 minutes

Lies, damned lies, and statistics…

For many years, the IT industry has used the threat of going out of business as a way of compelling businesses to invest in backup and Disaster Recovery solutions. Essentially, there has been more than a little scaremongering about the risk of failing to back up data properly and putting appropriate plans in place for disaster recovery.

Continue reading
  1690 Hits
1690 Hits

Confused about privacy: Untangling Safe Harbour, Privacy Shield and GDPR

Untangling Safe Harbour, Privacy Shield and GDPR

Privacy Shield a more formal compliance framework

The ‘borderless’ internet has created legal problems for nation states across the globe. Tax laws have brought all sorts of problems for international businesses as well as tax authorities and governments.

The laws on privacy are no less challenging. In the UK, the Data Protection Act, as enforced by the ICO, has been the cornerstone of safeguarding privacy. International standards are bounded by Privacy Shield and the General Data Protection Regulation (GDPR).

It is an area of some confusion. Here we help to untangle it with some key facts about Privacy Shield and GDPR.

Continue reading
  1434 Hits
1434 Hits

Cloud trends: Some developments that benefit SMEs

Cloud trends that benefits small medium businesses

The cloud marches on… the question is where next?

The cloud is perhaps the fastest growing technology trend of the last decade. When the world was dealing with the aftermath of the credit crunch and reeling with the blows from The Great Recession, businesses still needed the latest technology tools to ensure they could be competitive.

Continue reading
  1922 Hits
1922 Hits

Christmas and New Year IT systems review checklist

Christmas and New Year IT Systems review checklist

An ideal time to catch up and set out a review

Many firms experience a pre-Christmas rush of finishing off work and projects in early and mid-December. For items in the workflow that are on-going, there is often a sense of ‘parking’ them over the Christmas - New Year transition period until the return to work in January. Many businesses are likely to have reduced workload and staffing numbers.

Continue reading
  1452 Hits
1452 Hits

IT Support maturity model: What’s the right level for your business?

IT Support maturity model: What’s the right level for your business

Mapping IT Support services to a maturity model

If we apply maturity modelling to the IT Support function, we are able to produce an effective mapping that overlays the five levels of a traditional maturity model with five different service levels of support.

Continue reading
  2265 Hits
2265 Hits

3 things IT managers do better when support is outsourced to a specialist MSP

IT managers do better when support is outsourced

Throwing off conventional thinking to re-imagine the IT manager role

In conventional patterns of thinking about jobs within businesses of 10 - 100 people, the role of IT manager is seen as the go-to person for anything related to technology.

Across an infrastructure demanding provision of business technology tools to a workforce of varying degrees of technological competence, this might include anything from a broken mouse to troubleshooting software server problems.

Continue reading
  1529 Hits
1529 Hits

Tackling the security risk posed by ‘shadow IT’

Shadow IT: Questionable practice in a business context

Shadow IT: Questionable practice in a business context

The vast majority of computer users routinely use cloud services of some description. Whether it’s a Gmail account or a file transfer service, almost all of us use free cloud-based tools. This might be OK for personal use, however, in a business context, such an approach is highly questionable. Why?

Continue reading
  1348 Hits
1348 Hits

The 3 insider threats User Activity Monitoring helps prevent

The 3 insider threats user activity monitoring helps prevent

Insider threats: An unsavoury but unavoidable truth

When it comes to productivity and information security, insider threats are perhaps some of the most unsavoury considerations for a firm. Any business owner or senior executive would prefer to think they can implicitly trust the people that they pay but, unfortunately, it simply isn’t possible to ignore the risk of employee misbehaviour.

User Activity Monitoring (UAM) is a process that is enabled by productivity monitoring software, PMS. These applications are designed to track and record every action performed by a user. The software outputs a log file in plain English (rather than technobabble) and a video file that enables the firm to view each user’s onscreen actions.

Continue reading
  1370 Hits
1370 Hits
Top