HTS Blog

Twitter warns about cyber attacks

December 18th, 2015

Earlier this month, social media platform Twitter alerted a number of its users to the fact that their accounts may have been hacked into by something, or someone, known as a “state-sponsored actor.” While a warning of this kind is certainly not unprecedented – for some time now, both Facebook and Google have also been contacting any of their users who they think may have been targeted – it suggests that attacks of this type are becoming more widespread.

Google and the art of safe mobile browsing

December 17th, 2015

With the vast majority of end users turning to Google as their search engine or default browser of choice, it comes as no surprise to learn that the company takes security seriously. But in a perpetually changing landscape where anti-virus and anti-malware tools are constantly chasing their tails in order to stay up to date with the latest threats, there cannot be many small to medium-sized business owners who can afford to ignore the issues surrounding cyber security.

Don’t download that health app just yet

December 17th, 2015

Mobile health applications have been growing in popularity but this doesn’t necessarily mean their effectiveness is improving. In fact, doctors have called for greater oversight and regulation when it comes to health apps as many have never been truly tested.

When should you invoke your BCP?

December 12th, 2015

A Business Continuity Plan (BCP) is a valuable security blanket for countless companies across the nation. And while business owners hope they never have to invoke their continuity plan, it is important to understand which events might necessitate it coming into action.

The keys to a successful Office 365 migration

December 11th, 2015

Microsoft Office 365 is growing in popularity as more and more businesses make the move to the cloud. However, without proper planning and testing beforehand, you could get stuck in the middle of the migration process, end up with duplicated data, or even have to abort the transition completely.

Cortana tips to make your life easier

December 11th, 2015

Wouldn’t it be grand if you could afford to hire your own personal assistant? Someone who could take care of menial tasks, sing songs to you, and generally just make your life more pleasant? As technology develops, we are getting closer and closer to virtual assistants who are just as good as their real-life counterparts.

Don’t virtualize without answers

December 2nd, 2015

For small or medium-sized business, getting a leg up on the competition can be the difference between simply surviving and thriving. One way of doing this is by embracing virtualization. Many SMBs have used virtualization techniques to great effect, but implementing a change can be difficult and time-consuming.

4 facts about HIPAA and your IT

November 27th, 2015

While HIPPA’s implementation in relation to technology has been problematic to say the least, things have become much clearer over the course of the past year. However, there are still a few areas in which your office might not be compliant. This isn’t necessarily through negligence on your part, but rather simply a lack of understanding as to the requirements.

The difference between FXS and FXO

November 24th, 2015

Voice over Internet Protocol (VoIP) systems are designed to provide a reliable and cost-effective telecommunication environment for businesses. If you’re looking to deploy a VoIP telephony system for your company, you’ll probably come across the acronyms FXS and FXO from time to time.

Adding value to your company’s blog

November 23rd, 2015

Blogging has gone from being a fun side project for aspiring creatives to an absolute necessity for businesses of all sizes. For many companies, especially small to medium-sized ones, it’s likely to be just about the only web page that is updated with any regularity on their websites.