Industry Insight
Andy Kerr at Acronis delves into the world of web protection, exploring its importance for both the end-user and MSPs.
Latest Articles

Microsoft NCE – intY’s Need to Know Guide for MSPs
NCE is the latest development in the CSP program. Its aims are to simplify the way Microsoft’s products, models and

Adding Azure to your current offering
Our Microsoft consultant covers what you need to consider as an MSP when you are planning to offer Azure as

Deep Dive Interview with Zoom
Get to know Zoom Phone better with this exclusive interview from our Agency Lead – Amy Smith and Zoom Phone

Discover more about Microsoft’s New Commerce Experience (NCE)
Find out how Microsoft’s New Commerce Experience means for MSPs and what they can do to prepare for future changes.

Azure Migration
This blog takes you through the major steps to a rehost or environmental modernisation in Azure for Windows Server &

The Importance of Cybersecurity
With good security hygiene & the adoption of simple protocols like MFA, businesses can protect themselves from the majority of

Data & Network Security in Azure
Microsoft’s security offering is world-class due to the strength of its physical datacentre security & depth of insight they have.

The Importance of Email Security
Email security should be front & centre of any organisation’s cybersecurity plan with 94% of global malware attacks originating from

Zoom Technical Insights
Zoom technical insights featuring all of our partners most frequently asked questions answered by the experts themselves – Zoom.

SaaS Application Backup and why it’s important for SMBs
With the growth of the cloud at an all-time high, the importance of data protection for SaaS applications has never
Ransomware Insights and How You Can Prepare Your SMB
Despite the fact that major firms such as Garmin or the NHS are more likely to be targeted, SMBs can
intY Adds Master Agent Practice to Strengthen Partner Offering
Partnerships with prominent UCasS, CCaaS and SD-WAN suppliers add even more value and choice for intY’s growing partner base.
Most Popular Articles

Microsoft Azure in a nutshell
What is Azure? If you’ve heard about Microsoft Azure before, but aren’t sure what it does, in this article we’ve

Zero Trust Security Implementation: Security Best Practices from Microsoft
The Zero Trust approach is the best way to protect the remote and hybrid workplace, covering people, devices, apps, and

How Microsoft Defender is helping businesses beat cybercrime
Cybercriminals are well-known to exploit weaknesses in networks, processes, and devices to steal data and assets, harming both operations and