HTL Support News

Read the latest information and thinking on the world of IT Support Services.

Disaster Recovery Myths - and How to Manage Them

Disaster recovery myths

Disaster recovery is one of those topics that isn't particularly complicated, yet is easily misunderstood. It is, nonetheless, a crucial aspect of technology management. The cost of a disaster can be tremendous, and with no fast route to recovery, an adverse event can have game-changing consequences for a business.

Getting backup and disaster recovery right is not that hard, yet 50% of UK businesses are leaving their data at risk, according to a 2018 survey. Though businesses generally make some effort to guard against disaster, plenty of disaster recovery myths persist. In this article, we tackle those myths and propose steps to ensure a reliable disaster recovery scenario.

Continue reading

Linux vs Windows - Which OS is Better?

Which operating system is better

We all love comparisons. One of the oldest comparisons or debates in the history of IT is that which pits Windows against Linux. It’s a subplot of another debate with a much wider scope: proprietary vs open source, but just as relevant for businesses.

For as long as we can recall, Windows has been the OS of choice for most businesses, especially for their PCs and laptops. Linux usage, on the other hand, has been limited to servers and a few departments in certain organisations like research agencies, startups and universities. Does this still hold true in? Let’s talk about it.

Continue reading

Reactive vs Proactive IT Support - Know the Difference

Reactive vs Proactive IT Support

When it comes to IT services, many businesses still go for the fix-it-when-it-breaks approach. And why not? They think that getting the services of an IT support company only when a problem actually arises will save them money. But does it really?

If you also think that saving your financial resources for a time when something breaks down is the right way to manage your organisation's IT ecosystem, then it's time for you to know all about reactive and proactive IT support. This should help you to determine which would work best for your business. But first, on to the definitions.

Continue reading

Benefits of SaaS vs. Traditional Licences

Benefits of SaaS vs. Traditional Licences

For many businesses, the adoption of cloud-hosted services is no longer a question, cloud provisioning is an accepted fact. As a result, Software as a Service (SaaS) has grown enormously and is now adopted widely, even at enterprise level. That said, some businesses are still operating via the traditional licencing model.

The reason for the shift to the cloud and Software as a Service is simple: the benefits of the SaaS model greatly outweigh the disadvantages. We’ve written this article to remind readers that adopting SaaS was the right choice and to encourage businesses operating a traditional model to finally make the switch.

Continue reading

How Will 5G Impact Your Business?

How Will 5G Impact Your Business

The long-awaited and much-hyped 5G network has finally launched in some markets and will be rolled out in more major cities by the second half of 2019. 5G is the fifth and latest evolution of wireless connectivity and is expected to have a transformative impact on consumers’ lives and businesses across most industries. The reason for such excitement is, of course, the high speed, low latency, better network reliability and massive device connectivity that 5G performance promises.

While faster speeds are always a welcome development for end-users, the business landscape is where 5G is anticipated to have the most impact. In fact, an Oracle-commissioned survey of 265 business leaders and IT executives across 11 countries reveals that many enterprises are well aware of the possible opportunities that 5G connectivity can create. More than 80% of the respondents say that it can significantly improve many aspects of business operations, and more than 82% believe that it can pave the way for launching new products and services.

Continue reading

Top Tips to Combat VoIP Eavesdropping

Top Tips to Combat VoIP Eavesdropping

VoIP eavesdropping is not a new cybersecurity risk. The protocol that drives most of today’s VoIP applications, Session Initiation Protocol (SIP), has been in common use since the 2000s. However, according to IBM SecurityIntelligence, attacks that exploit the SIP protocols are on the rise. Thankfully, businesses have plenty of ways to reduce the opportunities for VoIP eavesdropping. Let’s take a look.

Continue reading

5 Big IT Trends to Watch Out For

5 Big IT Trends to Watch Out For in 2019

We saw advancements in technology that had never been witnessed. We’re talking about the explosion of voice technology such as Amazon Echo and the Google Assistant; low-code and no-code app development that has paved the way for fast, easy development of custom corporate apps; learning dexterity in robotics; successes in AI and natural language processing (NLP) that allow a machine to complete sentences, as well as other advances. And these breakthroughs are just the tip of the iceberg.

Technology for business and tech, in general, continues to advance, perhaps not as dramatically as before, but it will build on the groundwork already set. Here are the 5 big IT trends that could be hogging the headlines in the next few months.

Continue reading

Three Steps to Avoiding Data Loss in Office

Three steps to avoiding data loss in Office 365

The concerns businesses have about handing data over to cloud providers have, to a large extent, been assuaged. The ongoing growth of Microsoft’s Office 365 and the general trend towards cloud computing are evidence of this. Yet, as much as cloud providers are now seen as secure, businesses still need to take steps to prevent the loss of data stored in the cloud.

In an interesting finding, Gartner suggests that through 2022, 95% of cloud security failures will be the fault of customers, not cloud service providers. As much as Office 365 is easy to adopt administrators carry a strong responsibility to maintain security. Here are three steps that can help your business secure its Office 365 data.

Continue reading

8 Steps to Help Remote Workers Collaborate Better

8 Steps to Help Remote Workers Collaborate  Better

Working remotely is an increasing trend, with many enterprises tapping into the cost-saving benefits of remote working while employees enjoy the freedom that remote working brings. That said, remote working is still evolving, and in most companies, there is room for improvement.

According to an HR News survey, 53% of UK employees do not think that their employers are doing enough to accommodate the needs of remote workers. The solution lies partly in the managerial approach, and in part in the deployment of technology. In this article, we will cover eight tech-led approaches that can boost the collaborative experience for remote workers.

Continue reading

10 Questions to Ask When Choosing an IT Support Company

10 Questions To Ask When Choosing An IT Support Company

Choosing an IT support company is not a decision that should be taken lightly. Bear in mind that, due to the deep dependence of modern businesses on their IT infrastructures, the choice of IT support company can make a substantial impact on business processes. In this post, we outline 10 important questions you need to ask when choosing from a list of candidates.

Continue reading
Top