An IT Support Blog from London

Read the latest IT news, tips and insights from IT Support pros at HTL Support

What is Evasive Malware and How Big a Threat is It?

what is evasive malware

How do you eliminate a threat if you don’t know it’s there? Threat actors are increasingly incorporating evasive tactics into their malware, and traditional cyber security solutions are having a hard time detecting them. The moment you realise you’ve been attacked by an evasive malware, your systems would have long been compromised.

It’s important to know your adversary and understand how they operate in order to formulate appropriate countermeasures. That’s why we’re publishing this blog post. We hope to educate you about evasive malware, what they are, what level of threat they pose, what evasive tactics they employ, and what you can do to prevent them from taking hold of your systems.

Continue reading
  4899 Hits
4899 Hits

3 Important Considerations For Your Cybersecurity Budget

Cybersecurity Budget

While every business has its own unique operational requirements, it’s common for finance managers to try to save on costs and slash budgets in whichever area they can. This should not be the case for an organisation’s cybersecurity budget, though. If anything, companies should be spending for security based on an in-depth assessment of needs, rather than simply throwing in cyber security solutions to fit into a fixed budget.

In this post, we look at three key points that companies should take into account when building the framework for IT security spending.

Continue reading
  2751 Hits
2751 Hits

The Threat Landscape in 2022 — 5 Security Challenges to Look Out For

Threat Landscape

Another year is ahead of us and yet IT security threats are in no way letting up. Instead, the next months will continue to be challenging as data protection remains a major concern for enterprises. The rapid adoption of all things digital has also exponentially increased the threat surface through which cyber criminals can attack.

But which present the biggest cyber security dangers for this year? Will there be new threats or will the old ones simply evolve to pose greater difficulties? In this blog post, we take a closer look at the top 5 challenges that security experts believe could put business organisations at biggest risk this year.

Continue reading
  2580 Hits
2580 Hits

7 Best Practices in Managing Your IT Support Ticket System

IT Support Ticket System

An IT support ticket system is a key backbone of IT services. It determines the flow of customer service, from when your customer reaches out with their concern or request until you address or solve it. Without effective ticket handling processes, you get unnecessarily long downtimes that cut down on productivity and decrease client satisfaction. The more issues left unresolved, the more it can cost your business.

It’s well worth noting that clients may also refer to internal customers—employees who have issues with their devices or IT-related tasks. Resolving their concerns allows them to get back to work sooner and do their core functions. It is thus crucial to realise that reliable IT support services can improve efficiency in the day-to-day operations, give you an edge over competitors, and propel your company to greater heights.

Continue reading
  5005 Hits
5005 Hits

7 Steps to Recover from Ransomware and Protect Your Business

7 Steps to Recover from Ransomware

Ransomware attacks are incredibly prevalent – and can also be very damaging. Successful attacks occur all the time – this year alone, a major infrastructure company in the US was hit with an attack that came with a US$ 4.4m demand for ransom. Closer to home, Doncaster-based One Call Insurance found itself unable to service customer requests after a computer system blackout due to ransomware.

As a business, you need to invest in internet security to protect your systems against ransomware – but at the same time, also assume the worst-case scenario: that a successful attack can occur. Responding rapidly and effectively is critical – the better your response, the lower the cumulative cost of the ransomware attack – and the less disruption your clients or customers will experience.

Continue reading
  2807 Hits
2807 Hits

Addressing Security Issues in the Era of Remote Working

Addressing Security Issues in the Era of Remote Working

The world continues to grapple with the long term impact of the COVID-19 pandemic, and organisations are compelled to sustain remote working arrangements for their employees. In the haste to quickly adapt to the new and evolving work environment however, it appears that one essential concern has taken a back seat: security.

IT company Hewlett-Packard recently released Blurred Lines & Blindspots—a comprehensive global study assessing organisational cyber risk in today’s remote working era, and in it, a number of worrying, albeit unsurprising, findings were revealed. Of the over 8,000 office workers surveyed:

Continue reading
  2829 Hits
2829 Hits

IT Security for SMEs - What Do You Need to Think About?

IT Security for SMEs

Like any other form of crime, when it comes to cybercrime, there’s always the temptation to take the view that “it would never happen to us”. However given that, every single day, more than 65,000 attempts are made to hack an SME in the UK, the risk of cybercrime is real for UK businesses – no matter their size, or their position in the market.

In this article, we outline some of the key points SMEs in the UK should think about around IT security. While most businesses would take at least some precautions, it’s nonetheless worth taking a more structured approach to IT security – even if your business is not enterprise-scale.

Continue reading
  2897 Hits
2897 Hits

An Update On Current Cyber Security Threats and How You Can Mitigate Them

Current Cyber Security Threats

As organisations gradually shift to the new normal, we see corresponding changes in the cybersecurity threat landscape that warrants adjustments in how businesses should frame their security strategy. While some of the older threats certainly still remain, there are a couple of new entrants that have only emerged as a byproduct of the new work environment.

Continue reading
  3095 Hits
3095 Hits

The Challenges of BYOD and Why IT Support is Crucial

The Challenges of BYOD and Why IT Support is Crucial

A good percentage of companies in London and across the globe are already implementing a Bring Your Own Device (BYOD) policy. This move has not only significantly lowered organisations’ investment in corporate devices but has also proven to be very convenient at this time when the current health crisis is propelling the rise of remote working arrangements.

It’s best to keep in mind, however, that the implementation of BYOD environments has their own set of pain points that should be seriously evaluated and addressed. To find the solution for these issues, the services of an IT support professional are vital.

Continue reading
  4083 Hits
4083 Hits

How To Protect Your Web Apps From Hackers

How To Protect Your Web Apps From Hackers

Readers of this blog will be intimately familiar with the way technology delivery has changed over the years. Locally-hosted server racks are history. Instead, companies rely on cloud vendors large and small to deliver essential business services via web apps – or software as a service (SaaS).

Web apps, however, bring a whole new challenge to cyber security solutions. In this article, we outline why web app security matters and what your company can do to ensure that the web apps it uses remain secure.

Continue reading
  2292 Hits
2292 Hits
Top