Search:
Filter by:

Latest resources

    BLOG
    How to keep your people productive with remote working tools
    The recent COVID-19 pandemic has forced many businesses to adopt remote working practices. While..
    ISDN Switch off Connectivity
    BLOG
    PSTN vs ISDN vs SIP: Which is Best For You?
    The world of telecoms is full of confusing acronyms, especially when it comes to line rental. PTSN,..
    IT Security Cloud Managed Services
    BLOG
    Who’s the Boss? Is cloud IT working for you or are you working for IT?
    Is Cloud IT working for you or are you working for IT? Since launching our Touch Cloud private..
    Disaster Recovery
    BLOG
    Are your backup and disaster recovery plans fit for purpose?
    In September 2019, Hurricane Lorenzo became the easternmost category five hurricane on record for..
    Intercity IT Security
    BLOG
    The Road to Five Nines
    What is Five Nines When used to describe the availability of any system, Five Nines means 99.999%,..
    IT Security
    BLOG
    Discovering managed, cloud-based next-generation cybersecurity
    Cloud computing is commonplace within the public sector, but have you considered the benefits of..
    Mobility
    BLOG
    Mobile Device Management (MDM) – Why it Matters
    How many mobiles do you and your employees have each? None, one, two (or even more)? If the answer..
    Unified Communications
    BLOG
    4 ways to get the most out of your IT budget
    A trend we are seeing in 2018 is for increasing demand for solutions comprising multiple products..
    Unified Communications
    BLOG
    Touch Technology Cloudphone App Features
    Given that you can control Touch Technology via a browser, it may seem a little odd that anyone..
    IT Security
    BLOG
    How statistics-based attacks work
    Statistics-based attacks are characterized by excessive packet arrival rate. The objective of the..