Interlink Cloud Blog
Eric is a Senior Consultant at Interlink Cloud Advisors.
Eric Brophy

Improve Your Credential Hygiene with the Local Administrator Password Solution (LAPS)


Keeping your organization secure is a top priority – so what is credential hygiene and why is it important?

Good credential hygiene means not exposing credentials on a potentially-compromised system when those credentials can be used to compromise other systems. Credentials can be a password, an account’s NTLM hash, or a Kerberos TGT. When these kinds of credentials are hacked, there is the potential for the entire company to be at risk. That’s where Microsoft’s Local Administrator Password Solution (LAPS) can come into play.

Continue reading
  5741 Hits
Eric Brophy

What is a Customer Immersion Experience (CIE)?


For a lot of organizations, a big headache in the workplace is having access to new tools and technologies…but not knowing how to utilize them effectively. The way people work together is evolving, and unique projects, workstyles, functional roles and workforce diversity call for a complete set of collaboration tools. As the appetite for new ways of working together grows, new developments, communications, mobility, and cloud services are enabling professionals to communicate and collaborate in ways that were previously not possible.

Knowing that your time is valuable, we’ve developed a true to life, hands-on, interactive session designed for professionals like yourself – a Customer Immersion Experience (CIE). The CIE is not just a walkthrough or standard demo; a CIE puts you in the driver’s seat. It says it right in the name – this is a completely immersive experience that gets people engaged with their technologies in real life situations.

Continue reading
  7586 Hits
Eric Brophy

Prepare for Ransomware Attacks – What to Know


Cyberattacks are starting to hit harder than ever – and they are hitting every sector.

Ransomware attacks are becoming more vicious and impactful to our clients. Here are some high-level thoughts on preparing for the next attack.

Ransomware attacks are nothing new, they have been around for ages – the first documented attack being in 1989 known as the AIDS Trojan. This attack set the stage for the more sophisticated attacks we are seeing more frequently today. Infections have steadily increased every year since 2013, reaching record levels last year in 2017.

Recently, these infections have become more advanced and more dangerous. Hackers are now making their software harder to detect. Attackers can now also combine attacks by crafting a software to first hack into a network and then build a second software to capture the keystrokes of the users. With these attacks becoming more complex, it is important to ensure your organization is actively working on security practices and adding layers of protection constantly.

Continue reading
  4025 Hits
Eric Brophy

The Pros & Cons to Keeping a Hybrid Exchange Server Post Migration


Are you near the end of the migration journey?

Have all your mailboxes been successfully transferred to Exchange Online?

Customers will often want to turn off the Exchange mailboxes servers but sometimes debate if they should keep the Hybrid Exchange Server in place or not. Interlink typically recommends keeping the Hybrid Exchange Server in place becasue there are more pros than cons. We have outlind those below:

Continue reading
  24603 Hits
Eric Brophy

Multi-Factor Authentication and Why It’s Important

Multi-Factor Authentication

Multi-Factor Authentication in Office 365 and the Enterprise Mobility + Security Suite

Microsoft reported in their breach investigation report that over 75% of network intrusions originated from exploited weak or stolen credentials. So, how can companies protect against threats from hackers who are trying to access their data? 

Microsoft’s Multi-Factor Authentication (MFA) helps stop hackers through a process of authentication. It requires the use of more than one verification method and adds a second layer of security to user sign-ins and identity transactions. With MFA in place,hackers do not have access to the second-factordevice to login. The additional verification methods can include SMS text verification, mobile app approval or a phone call (with or without a pin). The end user experience can be improved by not promptinga second factor when they are on a trusted network or using a domain joined PC.

Continue reading
  9556 Hits

Welcome to the Interlink Cloud Blog

All content provided on this blog is for informational purposes only. The owner of this blog makes no representations or warranties regarding the information from our partners or other external sources.