Interlink Cloud Blog

Interlink Cloud Blog

Welcome to the Interlink Cloud Blog

All content provided on this blog is for informational purposes only. The owner of this blog makes no representations or warranties regarding the information from our partners or other external sources.
Mark Dreyer

New Microsoft Security and Compliance Licensing Bundle Options

Microsoft-Security-Compliance-Licensing-Bundle

Get the same Security and Compliance Tools but Avoid Paying the Full Microsoft 365 Enterprise Price!

Does your organization have security and compliance needs, but you aren’t ready to pay for everything in the Microsoft 365 E5 Suite? 

This past February, Microsoft added new advanced security and compliance offering bundles to their price list. These packages are great for businesses who are not yet ready to use or to pay for the highest-end Microsoft365 E5 bundle – which runs at $57 per user. The new Identity & Threat Protection and Information Protection & Compliance offerings are designed to provide customers with a bundle of solid functionality without breaking the bank. These new bundles give customers a smaller set of features at a smaller cost. If your business is not quite ready to make the leap to a larger bundle, these new security and compliance bundles may be the right choice; get the features you need without paying more for other features you won’t use right now.

Continue reading
  356 Hits
  0 Comments
Matt Scherocman

File Servers Are Painful – What Are File Server Alternatives?

file-server-alternatives

Nobody likes file servers. They are often in a state of chaos and accessing them from a mobile device is nearly impossible. Virtual private networks (VPNs) only work well on PCs and even then, we find users crossing their fingers every time they go to connect. Thankfully there are new options for sharing and collaborating on files. 

Here is a quick primer on some of the best new file server alternatives:

OneDrive for Business/Groups

Continue reading
  678 Hits
  0 Comments
Kirk Terrell

Office 365 Cloud App Security: Get Security Visibility in the Cloud

office-365-Cloud-App-Security

All the Cloud Controls You Have Been Waiting For

When company credentials have been compromised, all corporate data is instantly at risk. Hackers only need one victim to begin to access an entire organization – do you have a plan in place to prepare, detect or stop the threat before it’s too late?

Account compromise and credential harvesting attacks are occurring at alarming rates. In the event of a successful account compromise, time is crucial and the ability to respond quickly can significantly decrease the damage to your organization. Incident response teams should have a clear understanding of the steps involved in remediating unauthorized access events.  These steps should be clear and concise to avoid confusion and delayed containment. Microsoft helps with these steps by providing one single tool that covers many of the core incident response tasks.

Continue reading
  1422 Hits
  0 Comments
Matt Scherocman

Need Better Email Signatures? Exclaimer is the Answer

Microsoft Exclaimer

Exclaimer Cloud - Email Signatures for Office 365

Exclaimer is the premier cloud service for centrally managing and controlling Microsoft Office 365 email signatures. Exclaimer provides users with a standardized high-quality signature when sent from any device. Users can work with either a pre-made template or the drag and drop signature editor to create personalized signatures. Best part: no HTML skills required!

Continue reading
  622 Hits
  0 Comments
Eric Brophy

Multi-Factor Authentication and Why It’s Important

Multi-Factor Authentication

Multi-Factor Authentication in Office 365 and the Enterprise Mobility + Security Suite

Microsoft reported in their breach investigation report that over 75% of network intrusions originated from exploited weak or stolen credentials. So, how can companies protect against threats from hackers who are trying to access their data? 

Microsoft’s Multi-Factor Authentication (MFA) helps stop hackers through a process of authentication. It requires the use of more than one verification method and adds a second layer of security to user sign-ins and identity transactions. With MFA in place,hackers do not have access to the second-factordevice to login. The additional verification methods can include SMS text verification, mobile app approval or a phone call (with or without a pin). The end user experience can be improved by not promptinga second factor when they are on a trusted network or using a domain joined PC.

Continue reading
  1033 Hits
  0 Comments

Welcome to the Interlink Cloud Blog

All content provided on this blog is for informational purposes only. The owner of this blog makes no representations or warranties regarding the information from our partners or other external sources.