Interlink Cloud Blog

Interlink Cloud Blog

Welcome to the Interlink Cloud Blog

All content provided on this blog is for informational purposes only. The owner of this blog makes no representations or warranties regarding the information from our partners or other external sources.
Matt Scherocman

The New Ohio Data Protection Act & What it Means for Your Company’s Safety

ohio-data-protection-act

For businesses who implement security measures, Ohio becomes the first state in the nation to implement a law that affords a data breach safe harbor - the Ohio Data Protection Act.

Not a week goes by without hearing about a new data breach. It’s becoming common knowledge that companies, both small and large, are facing the tough reality that it is no longer a matter of if, but really when a company will be affected by a data breach.

Over the years, lawmakers have struggled with constructing effective methods to strengthen the cybersecurity of organizations without mandating one-size-fits-all requirements, which makes it challenging. At the beginning of November, Senate Bill 220, also known as the Ohio Data Protection Act, was enacted into law in the state of Ohio—which represents the first law that accomplishes that goal.

Continue reading
  2676 Hits
  0 Comments
Mark Dreyer

Azure Sentinel + Interlink's Energize Workshop Offering

Azure-Sentinel-Energize-Workshop-v3

Jump-start your security defenses with a cloud-native, scalable, threat intelligence (SIEM) solution!
_______________________________

Overview of Azure Sentinel

Azure Sentinel delivers intelligent security analytics and threat intelligence across the enterprise, providing a single solution for alert detection, threat visibility, proactive hunting, and threat response. Sentinel brings compliance to organizations through connecting Office 365 logs, especially when researching events that happened in the past, like previous behavior of a former employee or trying to determine access points that hackers may have used for entry while the default is that the log is only kept for 90 days. This is very limiting when a security breach occurs, or organizations would like to keep logs for more than 90 days. Connecting Office 365 logs to Azure Sentinel enables you to view and analyze this data in your workbooks, query it to create custom alerts, and incorporate it to improve your investigation process, giving you more insight into your Office 365 security.

Continue reading
  367 Hits
  0 Comments
John Rice

ON-DEMAND WEBINAR | Taking Your Information Security to the Next Level

2020.09.09-Information-Security-On-Demand-Webinar_Header

security webinar view webinar slides

Security is a process of continuous improvement…

If you are staying in place, that means you’re falling behind. Once organizations have the basics out of the way, how do you figure out what’s next for the security of your business?

In this on-demand webinar, Interlink's experts present a security framework that will help you understand how your security posture compares to similar organizations. From there you’ll learn the tools and strategies to take your information security to the next level.

After viewing the webinar and slides, you’ll have a good idea of how to implement an in-depth defense strategy for threat protection and manage information security from cloud to on-premise across all your end-user devices.

Continue reading
  557 Hits
  0 Comments
Mike Wilson

Microsoft 365 E5 Compliance Changes

Microsoft-365-e5---compliance-changes

Microsoft has recently released a new compliance bundle for Microsoft 365. Read on to learn the changes and how it can benefit your organization!

____________________________________________________________

New Microsoft 365 E5 Compliance Suite

Microsoft has repackaged its Microsoft 365 E5 Compliance Suite to bring new value and convenience to organizations. New products with this suite include Advanced Auditing, Insider Risk Management, Communication Compliance, Microsoft Cloud App Security (MCAS), and Machine Learning-Based Classification. Additionally, Microsoft offers “mini-suite” add-ons for organizations to buy individually, making it easier for customers to customize and choose the bundles that best fit and serve their organizational needs.

Organizations purchasing the Compliance Suite receive all of these bundles for only $10 per user, per month. The three new bundles are:

Continue reading
  597 Hits
  0 Comments
Mike Wilson

Windows Information Protection (WIP) | Avoid Data Leaks by Automatically Classifying and Protecting Files

Windows-Information-Protection---WIP

Windows Information Protection (WIP) is a data loss prevention feature for Windows 10 (version 1607 or later) that can automatically apply protective tags for files and data. Thus, allowing end-users to be productive and still keep your organization’s data secure!
______________________________________________

What is Windows Information Protection (WIP)?

Windows Information Protection (WIP) is an alternative to traditional data loss prevention approaches that focus on protecting data leakage at the network level. WIP protects against both accidental and intentional leakage of data by automatically encrypting internal data anytime users save a file locally to a protected Windows 10 system. Protecting organizational data is critical - now more than ever before! Lawsuits, legal challenges, and/or a loss of reputation is at stake if an organization is not successful in protecting their data. The ongoing blend of work and home life – especially in a COVID-19 world isn’t making that easier. More and more, we see end-users utilizing their work provided devices for personal tasks and data management. Similarly, end-users will access organizational data on their personal devices, which makes protecting your data tricky. WIP provides peace of mind and helps protect critical data regardless of where it’s accessed from. WIP not only helps protect files on end-users’ devices but can also be used to remotely wipe a device clean if needed via Intune. By selecting the user and device and sending a wipe request, all data that was protected via the WIP policy will become unusable.

Continue reading
  630 Hits
  0 Comments

Welcome to the Interlink Cloud Blog

All content provided on this blog is for informational purposes only. The owner of this blog makes no representations or warranties regarding the information from our partners or other external sources.