An IT Support Blog from London

Read the latest IT news, tips and insights from IT Support pros at HTL Support

The Case for a Holistic Approach to IT Security

The case for holistic approach to IT Security

An existential threat with authorities behind the curve

The National Crime Agency didn’t pull any punches in the report Cyber Crime Assessment 2016, published by its Strategic Cyber Industry Group. The Executive Summary warned of “an existential threat to one or more major UK businesses” and that “criminal cyber capability development currently outpaces the UK’s collective response to cyber crime.”

Continue reading
  3438 Hits
3438 Hits

Enjoy the Efficiency of Hosted Desktop with the Performance Graphics Application Users Need

Hosted Desktop Graphics performance with NVIDIA GRID

Hosted Desktop is Now available to firms with heavy graphics demands.

Hosted desktop offers significant benefits to businesses of all types and sizes. Business applications are in the cloud, hosted on our servers in the data centre. Using laptops, PCs, tablets or thin clients, each user’s computing desktop is delivered through a business-class Internet connection.

Continue reading
  3710 Hits
3710 Hits

3 Reasons Recruiters Do It Better in the Cloud

3 reasons recruiters do it better in the cloud

Flexible, secure and cost effective: What are you waiting for?!

Businesses of all types are able to benefit from cloud computing. However, some of the advantages lend themselves particularly well to certain aspects which characterise the recruitment sector. They simply map on to the needs of the recruitment business much better than an on-premise approach to provisioning technology for a recruitment business. Here, we outline three of them.

Continue reading
  3670 Hits
3670 Hits

How to Recover from a Data Loss Disaster in 20 Minutes

How to recover from a data loss disaster in 20 minutes

Lies, damned lies, and statistics…

For many years, the IT industry has used the threat of going out of business as a way of compelling businesses to invest in backup and Disaster Recovery solutions. Essentially, there has been more than a little scaremongering about the risk of failing to back up data properly and putting appropriate plans in place for disaster recovery.

Continue reading
  3814 Hits
3814 Hits

Confused about Privacy: Untangling Safe Harbour, Privacy Shield, and GDPR

Untangling Safe Harbour, Privacy Shield and GDPR

Privacy Shield a more formal compliance framework

The ‘borderless’ internet has created legal problems for nation-states across the globe. Tax laws have brought all sorts of problems for international businesses as well as tax authorities and governments.

The laws on privacy are no less challenging. In the UK, the Data Protection Act, as enforced by the ICO, has been the cornerstone of safeguarding privacy. International standards are bounded by Privacy Shield and the General Data Protection Regulation (GDPR).

It is an area of some confusion. Here we help to untangle it with some key facts about Privacy Shield and GDPR.

Continue reading
  3589 Hits
3589 Hits

3 Things IT Managers Do Better When Support Is Outsourced to a Specialist Msp

IT managers do better when support is outsourced

Throwing off conventional thinking to re-imagine the IT manager role

In conventional patterns of thinking about jobs within businesses of 10 - 100 people, the role of IT manager is seen as the go-to person for anything related to technology.

Across an infrastructure demanding provision of business technology tools to a workforce of varying degrees of technological competence, this might include anything from a broken mouse to troubleshooting software server problems.

Continue reading
  4044 Hits
4044 Hits

The 3 Insider Threats User Activity Monitoring Helps Prevent

The 3 insider threats user activity monitoring helps prevent

Insider threats: An unsavoury but unavoidable truth

When it comes to productivity and information security, insider threats are perhaps some of the most unsavoury considerations for a firm. Any business owner or senior executive would prefer to think they can implicitly trust the people that they pay but, unfortunately, it simply isn’t possible to ignore the risk of employee misbehaviour.

User Activity Monitoring (UAM) is a process that is enabled by productivity monitoring software, PMS. These applications are designed to track and record every action performed by a user. The software outputs a log file in plain English (rather than technobabble) and a video file that enables the firm to view each user’s onscreen actions.

Continue reading
  3211 Hits
3211 Hits

Two Factor Authentication: It Just Works!

Serviced Cloud 2 Factor Authentication

The problem with simple passwords

The issue of passwords is something of an evergreen problem for technology users. People often choose obvious, simple passwords that are easy to remember. Research has shown that a group of 10,000 words are used by 98.8% of people as passwords. This means that a hacker with software written for the purpose could automate the process of trying every one of these, something known as a ‘brute force’ attack, and would be certain of being able to hack into almost 99 out of every 100 accounts.

Continue reading
  4318 Hits
4318 Hits

Myth and Mist: Dispelling 5 Key Myths About the Cloud

Cloud Computing Myths

Clarity and truth on some cloud computing myths

A lot has been said and written about cloud computing. Some is true, and some is not. Here we help to provide clarity about the subject by dispelling 5 myths about the cloud.

Myth 1: The cloud is insecure

The myth persists that the cloud is somehow insecure. In fact, the cloud is more secure because security measures in place at properly secured cloud data centres exceed those found in the vast majority of ordinary business premises.

Continue reading
  4460 Hits
4460 Hits

Why It’s Time to Sack Your Large IT Support Supplier

The problem with big companies for consumers

The problem with big companies for consumers

We’ve all been there, particularly when dealing with personal consumer affairs. We are unhappy with the service we receive from a great big company that we deal with, like a telecoms provider, an energy supplier or an e-commerce giant. We try to get the company to rectify the situation, we may often find that we are still not satisfied that the outcome is fair.

Continue reading
  4251 Hits
4251 Hits
Top