An IT Support Blog from London

Read the latest IT news, tips and insights from IT Support pros at HTL Support

Tackling the Security Risk Posed by ‘Shadow IT’

Shadow IT: Questionable practice in a business context

Shadow IT: Questionable practice in a business context

The vast majority of computer users routinely use cloud services of some description. Whether it’s a Gmail account or a file transfer service, almost all of us use free cloud-based tools. This might be OK for personal use, however, in a business context, such an approach is highly questionable. Why?

Continue reading
  4064 Hits
4064 Hits

Two Factor Authentication: It Just Works!

Serviced Cloud 2 Factor Authentication

The problem with simple passwords

The issue of passwords is something of an evergreen problem for technology users. People often choose obvious, simple passwords that are easy to remember. Research has shown that a group of 10,000 words are used by 98.8% of people as passwords. This means that a hacker with software written for the purpose could automate the process of trying every one of these, something known as a ‘brute force’ attack, and would be certain of being able to hack into almost 99 out of every 100 accounts.

Continue reading
  4610 Hits
4610 Hits

Myth and Mist: Dispelling 5 Key Myths About the Cloud

Cloud Computing Myths

Clarity and truth on some cloud computing myths

A lot has been said and written about cloud computing. Some is true, and some is not. Here we help to provide clarity about the subject by dispelling 5 myths about the cloud.

Myth 1: The cloud is insecure

The myth persists that the cloud is somehow insecure. In fact, the cloud is more secure because security measures in place at properly secured cloud data centres exceed those found in the vast majority of ordinary business premises.

Continue reading
  4796 Hits
4796 Hits

Cloud Versus On-site: The Facts about IT Security

Cloud Vs. On-premise: The facts about IT security

The facts about IT security

IT security is a topic of conversation that is likely to be a cause for concern for companies of all sizes. There is a perception that larger businesses have superior security, but this isn’t always true. Just ask telecoms giant TalkTalk who were hacked in 2015 and had significant amounts of data stolen, leading to some customers falling victim to fraud.

This shows that it isn’t necessarily size that determines the vulnerability of a company to an IT security breach. It’s the perceived risk, the culture of the business and the security measures that are in place. Big businesses may be at least as vulnerable as their mid-market and SMB counterparts when they don’t have the right safeguards in place.

Continue reading
  5274 Hits
5274 Hits

Privacy Shield: Wrangle over Safe Harbour and US Government Access to EU Data Appears Finally Settled

Serviced Cloud ensure privacy and UK data sovereignty of the data of British businesses

Privacy Shield a more formal compliance framework

Disagreement over the Safe Harbour, which let American companies use a single standard for consumer privacy and data storage in both the US and Europe, appears to have finally ended. Safe Harbour was rejected by the EU following leaks by Edward Snowden which discredited it because US Government security agencies were revealed to have flouted the rules.

Safe Harbour let US companies self-certify they protected data about EU citizens appropriately; however, the US National Security Agency practiced widespread surveillance through accessing data which was supposedly protected by Safe Harbour.

Continue reading
  3828 Hits
3828 Hits

ISO27001: Your Guarantee of Information Security with HTL's Serviced Cloud Solution

ISO27001 and HTL Support guarantees information sercurity

Cloud booming but some variability in quality

The cloud and managed services space have mushroomed in recent years. Some of the main reasons the cloud has boomed include:

  • Businesses have rushed to exploit its advantages
  • VARs and resellers have jumped on the cloud bandwagon
  • Knowledge proliferation around implementing cloud solutions
  • Lower barriers to entry as tech costs have fallen
  • Subcontracting of infrastructure to third-party data centres
Continue reading
  5557 Hits
5557 Hits

7 of the Most Significant Threats to IT Security for Small and Medium Businesses

7 security threats to IT Security

Strong business case using outsourced services

Last year saw no let-up in the anxieties over cyber security. Criminal enterprises seem able to distribute malware via email to steal identities unimpeded by the international cyber law enforcement authorities; hackers continue to crack open customer databases of businesses as diverse as TalkTalk and Ashley Madison. It is a necessity for any business on the internet to be able to effectively defend against today’s agile threat environment.

Continue reading
  4754 Hits
4754 Hits

Microsoft Invests out of Safe Harbour Wrangle but It Doesn’t Change the Right-sized Partner Rationale for Smaller Enterprises

Data Privacy Safe Harbour

Safe Harbour renegotiation by the end of January

Following the EU ruling that rendered the Safe Harbour agreement invalid last October 2015, in November Sataya Nadella (the current wearer of Bill Gates’ big Microsoft CEO shoes), announced investment in UK data centres as part of a $2bn European cloud infrastructure development plan.

Continue reading
  3286 Hits
3286 Hits

As Safe Harbour Flounders Private Cloud under UK Data Sovereignty Remains Best Assurance of Privacy

Serviced Cloud private cloud solutions

Safe Harbour flounders on judicial rocks

The Safe Harbour agreement, which lets American companies use a single standard for consumer privacy and data storage in both the US and Europe, has been ruled invalid. The agreement, which would have provided clarity and certainty over complex sovereignty issues of data stored in the cloud, seems to have floundered as a result of the whistleblowing activities of Edward Snowden.

Continue reading
  5072 Hits
5072 Hits
Top