top of page
All Posts


The Pros and Cons of Microsoft 365 for a Small Business
Pros and cons explained, plus a case study. How can Microsoft 365 work for small businesses in 2025? Its full value depends on your...

Intouch
Aug 156 min read


Major Changes Are Coming to SharePoint in 2025 – Are You Ready?
As we move into 2025, Microsoft SharePoint is set to undergo a transformative evolution
James Garland
Aug 86 min read


What is a Firewall and Why Your Business Needs One
Professional network firewall implementation ensures your business remains protected against external threats and internal security breaches.
James Garland
Aug 14 min read


Real-World Data Breach Case Studies:
We all know about the recent Data Breach of M&S (9.4 million claimed to have been affected) and the Co-Op Cyber-Attack (20 million claimed to be affected) in May and July of this year; Intouch has recently been tweeting about both. But there have been many more recent and less high-profile attacks you might not have heard of or remember.
James Garland
Jul 2511 min read


What’s New in Microsoft 365 Business? Monthly Feature Roundup
In June 2025, Microsoft introduced a range of transformative updates and enhancements across its key business offerings, including Microsoft 365, Dynamics 365, Azure, and the Power Platform.

Intouch
Jul 183 min read


Why Proactive IT Support Is Your Business’s Edge
Technology is at the heart of nearly everything your business does. From emails and data storage to customer management, your IT systems...

Intouch
Jul 114 min read


Top Password Hygiene Tips for Businesses: How The Keeper Password Manager Can Help Secure Your Data
Effective password hygiene is vital for businesses to prevent data breaches and forms a key part of your cyber security strategy. This article provides essential password hygiene tips for businesses and explains how Keeper Password Manager can help secure your data.

Intouch
Jul 77 min read


Cyber Security Top 5 Tips 2025: Stay Ahead of Emerging Threats and Your Weakest Links.
In this article, we’ll cover our top five cyber security tips to help you protect your business's digital world. These essential tips will keep you ahead of emerging threats and safeguard your data effectively.
James Garland
Jun 277 min read


Ransomware: What Is It and How Do I Protect Myself Effectively?
Ransomware locks your files or system until you pay a ransom. This article explains ransomware: what is it and how do I protect myself? Learn how it spreads, types of ransomware, and steps to keep your data safe.

Intouch
Jun 2010 min read


Secure Your Data: Why Cloud Backups Are Non-Negotiable
Benefits of Cloud Backup Data Backup and Recovery Cloud backup enables swift data recovery, minimising downtime and ensuring business...
James Garland
Jun 135 min read


Microsoft 365 Support Tips and FAQs: Your Go-To Guide for Smooth Operation
Microsoft 365 is at the heart of modern workplace productivity. From cloud-based email and file sharing to powerful communication tools like Microsoft Teams, it's a trusted solution for millions of users worldwide, whether you're managing a business account, supporting a hybrid workforce, or staying connected across multiple devices. This guide offers actionable Microsoft 365 support tips, solutions to common issues, and answers to FAQs.

Intouch
Jun 64 min read


What is Managed IT Services?
In today’s fast-paced digital world, technology plays a vital role in the day-to-day operations of businesses. From communication and...

Intouch
May 236 min read


Why Choose Microsoft 365 for Business: A Complete Guide for Workplaces
Modern businesses rely on digital tools that are secure, flexible, and collaborative. Microsoft 365 (formerly Office 365) offers an...

Intouch
May 166 min read


What is Pen Testing?
In an era of increasing cyber threats, cyber security has become a business-critical priority. Whether you're a small company or a large...

Intouch
May 125 min read


Why Cyber Security Matters for Your Business
Cybersecurity is no longer an optional consideration for businesses; it’s a core part of your operational success. Zero trust is a...

Intouch
Apr 296 min read


How to Spot Phishing Attacks and Protect Your Business
In today’s digital landscape, cybersecurity threats are an ever-present danger to businesses of all sizes. Among these threats, phishing...
James Garland
Sep 30, 20244 min read
bottom of page