Interlink Cloud Blog
Mike Wilson brings over eighteen years of technology experience to Interlink Cloud Advisors. Prior to joining Interlink, he served as a Director of Technology for a mid-size insurance company and has led multiple consulting practices to substantial growth. In those roles, Mike delivered tremendous value for his customers by designing and...
Mike Wilson brings over eighteen years of technology experience to Interlink Cloud Advisors. Prior to joining Interlink, he served as a Director of Technology for a mid-size insurance company and has led multiple consulting practices to substantial growth. In those roles, Mike delivered tremendous value for his customers by designing and implementing scalable, reliable and business aligned solutions. Mike’s focus at Interlink is on leveraging the power of the Microsoft cloud to streamline IT operations in a way that reduces cost and allows businesses to refocus on core operations. He plays a key role in architecting projects and ensuring high standards in service delivery across the Interlink team. Mike earned a Bachelor of Science degree in Mathematics from the University of Cincinnati and is a proud graduate of St. Xavier High School. He is active in a number of local non-profits and has served on multiple non-profit boards and in executive leadership.
More
Mike Wilson

Microsoft Rebrands Security Suite Products to Microsoft Defender

Microsoft-Defender-Security-Suite-of-products

Microsoft Defender unifies all extended detection and response (XDR) technologies under the Microsoft Defender brand.

Read on to learn about the rebranding and new capabilities!
_______________________________________

Microsoft Defender

As attacker strategies and tactics become more advanced and malicious, organizations must stay on top of security. No longer does protecting individual areas such as email or endpoints keep your environment secure. Extended detection and response (XDR) is a new approach that is designed to deliver intelligent, automated, and integrated security across domains to help defenders connect seemingly disparate alerts and get ahead of attackers.

Continue reading
  1560 Hits
  0 Comments
Mike Wilson

On-Demand | Azure Windows Virtual Desktop

On-Demand-Webinar_Azure-Windows-Virtual-Desktop_blog-header

View On Demand Webinar Azure Windows Virtual Desktop

Powered by the Azure Platform, Azure Windows Virtual Desktop is a powerful new technology that enables organizations to provide desktop-as-a-service to end-users...  

If you have looked at virtual desktop solutions in the past, prepare to be wowed when you see how Microsoft has streamlined the deployment and management of Windows Virtual Desktop in ways that make Windows Virtual Desktop a cost-effective and secure solution for your end-users and applications.

In this exclusive on-demand webinar, we walk you through common Windows Virtual Desktop use cases, key design principles, and management and security benefits.

Continue reading
  1447 Hits
  0 Comments
Mike Wilson

How to Leverage the Full Compliance Capabilities of Microsoft 365

Compliance-Workshop-blog-header

Are You Leveraging the Full Compliance Capabilities of Microsoft 365?

This Interlink Workshop Can Show You How
_________________________________________

Complying with the growing number of regulatory standards is an ongoing challenge for most organizations. The Health Insurance Portability Accounting Act (HIPAA) has been around for more than two decades. The European Union’s General Data Protection Regulation (GDPR) is the newest addition to the regulatory lineup with its nearly 100 articles. In between are other security standards from the credit card industry, the National Institute of Standards and Technology (NIST), and the International Organization for Standardization (ISO). There are now over 200 updates each day from 900 regulatory bodies.

How are you supposed to keep up and comply with the alphabet soup of regulations?

Help is on the way.

Continue reading
  1098 Hits
  0 Comments
Mike Wilson

Microsoft 365 E5 Compliance Changes

Microsoft-365-e5---compliance-changes

Microsoft has recently released a new compliance bundle for Microsoft 365. Read on to learn the changes and how it can benefit your organization!

____________________________________________________________

New Microsoft 365 E5 Compliance Suite

Microsoft has repackaged its Microsoft 365 E5 Compliance Suite to bring new value and convenience to organizations. New products with this suite include Advanced Auditing, Insider Risk Management, Communication Compliance, Microsoft Cloud App Security (MCAS), and Machine Learning-Based Classification. Additionally, Microsoft offers “mini-suite” add-ons for organizations to buy individually, making it easier for customers to customize and choose the bundles that best fit and serve their organizational needs.

Organizations purchasing the Compliance Suite receive all of these bundles for only $10 per user, per month. The three new bundles are:

Continue reading
  3438 Hits
  0 Comments
Mike Wilson

Windows Information Protection (WIP) | Avoid Data Leaks by Automatically Classifying and Protecting Files

Windows-Information-Protection---WIP

Windows Information Protection (WIP) is a data loss prevention feature for Windows 10 (version 1607 or later) that can automatically apply protective tags for files and data. Thus, allowing end-users to be productive and still keep your organization’s data secure!
______________________________________________

What is Windows Information Protection (WIP)?

Windows Information Protection (WIP) is an alternative to traditional data loss prevention approaches that focus on protecting data leakage at the network level. WIP protects against both accidental and intentional leakage of data by automatically encrypting internal data anytime users save a file locally to a protected Windows 10 system. Protecting organizational data is critical - now more than ever before! Lawsuits, legal challenges, and/or a loss of reputation is at stake if an organization is not successful in protecting their data. The ongoing blend of work and home life – especially in a COVID-19 world isn’t making that easier. More and more, we see end-users utilizing their work provided devices for personal tasks and data management. Similarly, end-users will access organizational data on their personal devices, which makes protecting your data tricky. WIP provides peace of mind and helps protect critical data regardless of where it’s accessed from. WIP not only helps protect files on end-users’ devices but can also be used to remotely wipe a device clean if needed via Intune. By selecting the user and device and sending a wipe request, all data that was protected via the WIP policy will become unusable.

Continue reading
  2229 Hits
  0 Comments

Welcome to the Interlink Cloud Blog

All content provided on this blog is for informational purposes only. The owner of this blog makes no representations or warranties regarding the information from our partners or other external sources.