Interlink Cloud Blog


Matt Scherocman brings more than 15 years of experience in the information technology industry to Interlink Cloud Advisors. His experience includes both the system integrator and manufacturer sides of the business. During his time at the Microsoft Corporation he was responsible for all the the Large Account Reseller (LAR) relationships in the four ...state Heartland Area of Michigan, Ohio, Kentucky, and Tennessee. Prior to Microsoft, Scherocman led a Cincinnati based IT consulting company to grow 5000% and become a Microsoft Worldwide Partner of the Year. He is actively involved in the strategic vision and operation decisions of the company including finance, selling strategy and marketing. Matt holds a Bachelor of Science in Business degree from Miami University and is a Certified Expert in Microsoft licensing including speaking engagements at both Microsoft's Worldwide Partner Conference and Channel Partner Summit. He is a frequent contributor to leading industry publications. More
Matt Scherocman

What Data Security and Compliance is Built into Office 365?

Security is at the heart of Office 365.  Here are some great bullet points from a recent Microsoft blog listing.  Check out the full article here:
Built-in capabilities

    • Physical security - We monitor our data centers 24/7 and we have technologies and processes to protect our data centers from unauthorized access or natural disasters
    • Security best practices -We use best practices in design like Secure Development Lifecycle and operations like defense-in-depth to keep your data secure in our data centers
    • Data encryption - Every customers' email content is encrypted at rest using BitLocker Advanced Encryption Standard (AES) encryption
    • Secure network layer - Our networks are segmented, providing physical separation of critical back-end servers from the public-facing interfaces at the same time our Edge router security detects intrusions and signs of vulnerability
    • Automated operations like Lock Box processes - Access to the IT systems that store customer data is strictly controlled via lock box processes. This access control mechanism is similar to a system where two people have to turn the key for an action to be allowed.


    • Independently Verified - Third party audits verify that Office 365 meets many key world-class industry standards and certifications
    • Control framework - We follow a strategic approach of implementing extensive standard controls that in turn satisfy various industry regulations. Office 365 supports over 600 controls that enable us to meet complex standards and offer contracts to customers in regulated industries or geographies, like ISO 27001, the EU Model Clauses, HIPAA Business Associate Agreements, FISMA/FedRAMP
    • Comprehensive Data Processing Agreement - Our Data Processing Agreement comprehensively addresses privacy and security of customer data, helping customers comply with local regulations


    • No Advertising - We do not scan email, documents, build analytics or data mine to build advertising products. In fact, we do not use your information for anything other than providing you services you have subscribed for.
    • Data Portability - As an Office 365 customer, your data belongs to you, and you can export your data at any time with no restrictions. We act only as a data processor and provider of productivity services, not as a data owner
    • Notice and Consent - When we act upon your data, we let you know why and we ask for permission in advance or redirect any inquiries to our customers unless legally prevented to do so.
    • Breach Response - We have strong, tested and audited processes to inform you if there is a breach and re-mediate issues if they occur.
    • Data Minimization - We strive to minimize the actual amount of customer data that our internal teams have access to.

This posting is provided “AS IS” with no warranties, and confers no rights.

Continue reading
  5048 Hits
Matt Scherocman

What Reports Does Microsoft Have Available For Monitoring Skype for Business Usage?

Microsoft has NEW Lync Reporting in Office 365.

These reports help you to visualize lync usage throughout your business.

Follow the link below for more information:

This posting is provided “AS IS” with no warranties, and confers no rights

Continue reading
  4320 Hits
Matt Scherocman

What Are The Different Options for Microsoft Office?


The following chart highlights the differences/similarities between Microsoft Office Products, to help you better understand what product will best fit your needs.

For more information on each, please see the links below:
Traditional Office Pro
Office 365 Pro Plus
Office Web Apps
Office Mobile

 This posting is provided “AS IS” with no warranties, and confers no rights.


Continue reading
  5094 Hits
Matt Scherocman

Does Microsoft Have Training for Skype for Business?

Microsoft has a free program for End User Lync Training (See link Below)
Designed as 30- to 60-minute learning modules, these engaging sessions enable users to focus their attention on one workload at a time, expediting their learning curve, building confidence, and improving their overall experiences with Lync.
Examples of current course offerings include:

    • Lync Daily Demo: a high-level overview of Lync’s capabilities, designed for those evaluating or just getting started with Lync
    • Contacts and Conversations: a deep look at how to optimize Lync’s instant messaging and presence capabilities
    • Enterprise Voice Basics: an overview of using Lync’s enterprise voice features
    • Online Meeting Basics: an introduction to scheduling and presenting Lync meetings
    • Present Like a Pro: an advanced class designed to hone one’s Lync presentation skills

Action Maximize your Lync adoption potential with these complimentary, instructor-led, online training courses.
This posting is provided “AS IS” with no warranties, and confers no rights.

Continue reading
  3492 Hits
Matt Scherocman

What Are The Top 10 Questions to Ask Your Cloud Service Provider?

Microsoft has identified the key privacy and security considerations to help you determine the cloud service provider that meets your security expectations.

A few examples taken from "The Top 10 Trust Tenets" article:

    1. Who owns the data I put in your service?
    1. Where is my data located?
    1. How is my data protected from external attacks?
    1. Can I get my data out of your service whenever I want?
    1. Will you use my data to build advertising products?

This article address many of the questions and concerns of moving to the cloud.
Click here to find the answers and access the article online
Other topics found in this article include:

    • Top 10 privacy and security features of Office365
    • Top 10 contracts, certifications, standards, and regulations that enable compliance

This posting is provided “AS IS” with no warranties, and confers no rights.

Continue reading
  4400 Hits

Welcome to the Interlink Cloud Blog

All content provided on this blog is for informational purposes only. The owner of this blog makes no representations or warranties regarding the information from our partners or other external sources.