An IT Support Blog from London

Read the latest IT news, tips and insights from IT Support pros at HTL Support

‘Support’ Is More Important than ‘IT’ in IT Support

'Support' is more important than 'IT' in IT Support

Greater emphasis on Support rather than IT skills

That’s a slightly provocative title for this blog. After all, there are two elements here. ‘IT’ refers to the technical bit, the ‘hard’ skills, while ‘Support’ speaks to the ‘soft’ skills of dealing with people, the context of any problem and managing it through to resolution.

For any given problem to be resolved within an acceptable time-frame requires the support person to be able to deliver on both counts equally well.

So why do we make the assertion that there is a greater emphasis on Support skills rather than IT skills?

Continue reading
  5340 Hits
5340 Hits

Ransomware: Increasing Threat Requires Greater Preparedness, Common Sense and Resolution

Ransomware: Increasing threat requires greater preparedness, common sense and resolution

National publicity for council ransomware attack

In January it was nationally reported that Lincolnshire County Council (LCC) had fallen victim to a ransomware attack which rendered it unable to access systems and data for a week. Across the authority, as many as 5,000 staff had to revert to manual processes using pen and paper.

The cybercriminals had performed data ‘kidnapping’ by infecting LCC systems and encrypting the data. The data remained on the organisation’s infrastructure but was rendered inaccessible. The ransom demand for its safe release by providing the decryption key was set at the princely sum of $500 (£350).

Continue reading
  4206 Hits
4206 Hits

Can You Run Your Business from a Tablet?

IT Support for businesses in London

Tablets conquer the world in less than 7 years

Today’s tablets are powerful, flexible and handy computing devices. It’s hard to think that the first tablet to gain popular mainstream acceptance, the original Apple iPad, only debuted on April 3rd 2010.

Since then the market has exploded with devices from the big hardware manufacturers as well as those from hundreds of new market entrant brands. There are a lot of size options and the smallest 3/4G capable ones blur the line between the phone and the tablet – quite literally where does the tablet end and the smartphone begin?

Tablet computers are ubiquitous and seem to have conquered practically all markets. But can you run a business from one?

Continue reading
  5369 Hits
5369 Hits

The Perils of IT Support from a One-man Band

IT Support for IT Problems

IT staffing ratio - how do the numbers stack up?

In a company of perhaps 20 people or so, many will have taken the view that staff numbers mean there is enough work to recruit an IT manager. However, what do you do before you reach this size?

Many small companies choose to engage external consultants to provide hands-on support. Often these are solo operators, one-man bands. While they may be competent and well-intentioned, there are a number of inherent problems which may prevent them from responding with the appropriate service levels you need to run your business.

Continue reading
  5298 Hits
5298 Hits

Privacy Shield: Wrangle over Safe Harbour and US Government Access to EU Data Appears Finally Settled

Serviced Cloud ensure privacy and UK data sovereignty of the data of British businesses

Privacy Shield a more formal compliance framework

Disagreement over the Safe Harbour, which let American companies use a single standard for consumer privacy and data storage in both the US and Europe, appears to have finally ended. Safe Harbour was rejected by the EU following leaks by Edward Snowden which discredited it because US Government security agencies were revealed to have flouted the rules.

Safe Harbour let US companies self-certify they protected data about EU citizens appropriately; however, the US National Security Agency practiced widespread surveillance through accessing data which was supposedly protected by Safe Harbour.

Continue reading
  3795 Hits
3795 Hits

Why Your IT Manager Needs Our Backup and Support

IT Support for IT Managers in London

The need for vital skills and expertise

One of the key HR concepts in business is to avoid person dependence. Many businesses have experienced difficulties resulting from the inability to access vital skills and expertise, from specific individuals, relied on to deliver services to clients and customers.

Continue reading
  4963 Hits
4963 Hits

Hosted VoIP Update: Customised Solutions Delivering More Powerful Lower Cost Business Telephony

Serviced Cloud Hosted VOIP solution

Voice and data convergence for higher quality communications

Hosted telephony solutions offer the ability to eliminate a major inefficiency for many businesses – BT telephone and ISDN lines. Often these simply duplicate the connectivity that can be provided equally well via business-class broadband connections.

The budget that is released by decommissioning telephone lines or ISDNs can be used to upgrade and introduce greater resilience to business broadband while delivering an overall lower cost for data and voice connectivity.

Continue reading
  5883 Hits
5883 Hits

ISO27001: Your Guarantee of Information Security with HTL's Serviced Cloud Solution

ISO27001 and HTL Support guarantees information sercurity

Cloud booming but some variability in quality

The cloud and managed services space have mushroomed in recent years. Some of the main reasons the cloud has boomed include:

  • Businesses have rushed to exploit its advantages
  • VARs and resellers have jumped on the cloud bandwagon
  • Knowledge proliferation around implementing cloud solutions
  • Lower barriers to entry as tech costs have fallen
  • Subcontracting of infrastructure to third-party data centres
Continue reading
  5523 Hits
5523 Hits

10 Ways to Avoid Phishing Scams Tricking You into Revealing Personal or Financial Information to Cybercriminals

Email Security solutions to avoid phishing

Don’t fall victim…

One of the most serious risks originating from the Internet to businesses and domestic users is the threat of phishing. Phishing is a form of fraud where a cybercriminal attempts to trick the recipient of a message into revealing information such as login credentials or account information by masquerading as a reputable entity or person, typically in an email, but it can be attempted through other communication channels.

A victim receives a message that appears to have been sent by a known contact or organisation. An attachment or links in the message may install malware on the recipient’s device or send them to a malicious website designed to trick them into divulging personal and financial information, such as passwords, account IDs or credit card details.

You then find your personal or business bank account has been raided or your credit cards used to purchase luxury goods. Here are 10 ways to prevent users in your business from being tricked by phishing emails.

Continue reading
  6891 Hits
Tags:
6891 Hits

Securing Data in the Age of BYOD with Policy

Bring your own device

Benefits of BYOD difficult to ignore

Traditionally, businesses discouraged and even prevented employee-owned devices being used in the workplace for accessing company data and services. This was especially true of larger businesses or those with compliance requirements to meet.

Continue reading
  7356 Hits
7356 Hits
Top