Interlink Cloud Blog

Interlink Cloud Blog

Welcome to the Interlink Cloud Blog

All content provided on this blog is for informational purposes only. The owner of this blog makes no representations or warranties regarding the information from our partners or other external sources.
Eric Brophy

Prepare for Ransomware Attacks – What to Know

Ransomware-Attacks

Cyberattacks are starting to hit harder than ever – and they are hitting every sector.

Ransomware attacks are becoming more vicious and impactful to our clients. Here are some high-level thoughts on preparing for the next attack.

Ransomware attacks are nothing new, they have been around for ages – the first documented attack being in 1989 known as the AIDS Trojan. This attack set the stage for the more sophisticated attacks we are seeing more frequently today. Infections have steadily increased every year since 2013, reaching record levels last year in 2017.

Recently, these infections have become more advanced and more dangerous. Hackers are now making their software harder to detect. Attackers can now also combine attacks by crafting a software to first hack into a network and then build a second software to capture the keystrokes of the users. With these attacks becoming more complex, it is important to ensure your organization is actively working on security practices and adding layers of protection constantly.

Continue reading
  255 Hits
  0 Comments
Eric Brophy

Multi-Factor Authentication and Why It’s Important

Multi-Factor Authentication

Multi-Factor Authentication in Office 365 and the Enterprise Mobility + Security Suite

Microsoft reported in their breach investigation report that over 75% of network intrusions originated from exploited weak or stolen credentials. So, how can companies protect against threats from hackers who are trying to access their data? 

Microsoft’s Multi-Factor Authentication (MFA) helps stop hackers through a process of authentication. It requires the use of more than one verification method and adds a second layer of security to user sign-ins and identity transactions. With MFA in place,hackers do not have access to the second-factordevice to login. The additional verification methods can include SMS text verification, mobile app approval or a phone call (with or without a pin). The end user experience can be improved by not promptinga second factor when they are on a trusted network or using a domain joined PC.

Continue reading
  415 Hits
  0 Comments
Eric Brophy

Azure AD Password Protection & Smart Lockout Now in Public Preview

Azure-AD-Password-Protection

Azure AD Password Protection helps eliminate easily guessed passwords from the environment, which can dramatically lower the risk of being compromised by attackers. It also protects by preventing users from setting their passwords to common, weak and risky passwords and prevents bad actors from trying to brute force attack those accounts.

Many attackers know how users create passwords, and more often than not, businesses ldo not have a security policy in place around user created passwords. Therefore, Azure AD Password Protection would be beneficial for any business that wants to improve their network security and prevent data loss through user identity compromise.

Continue reading
  612 Hits
  0 Comments
Ken Kruthaup

SQL Advanced Threat Protection | Securing Your SQL Database

SQL-Advanced-Threat-Protection-2

SQL Advanced Threat Protection (ATP) now offers DBAs (Database Administrators) the opportunity to discover and classify sensitive data, understand database vulnerabilitiesand detect abnormal activities that could indicate a threat to the database. Thereby providing a central go-to location for enabling and managing these security capabilities.

SQL Advanced Threat Protection provides...

a set of advanced SQL security capabilities, including Data Discovery & Classification, Vulnerability Assessment & Threat Detection.

Continue reading
  445 Hits
  0 Comments
Eric Brophy

How Office 365 Advanced Threat Protection’s New Anti-Impersonation Features Help Defend Against Phishing Attacks

Phising-Attacks-Office-365-Advanced-Threat-Protection

Chances are high that you have been the target of several types of nefarious malware phishing campaigns in the past year. Throughout the second half of 2017 alone, Microsoft Office 365 Advanced Threat Protection (O365 ATP) mitigated a billion phishing emails. Because attacks are getting more complex and sophisticated, Microsoft continues to improve O365 ATP to help you defend your digital environment. Office 365 Advanced Threat Protection is just one of four different products from Microsoft with the Advanced Threat Protection branding attached. All work together to provide a layered approach to security. Learn in our article: Addressing Confusion Around Microsoft’s 3 Advanced Threat Protection Solutions.

O365 ATP continues to develop strong defenses against phishing attacks and the results show their effectiveness. O365 ATP has now achieved a malware catch rate greater than 99.9% and a 45 second average file detonation time (meaning that the time for emails to be deep scanned is less than a minute now).

Continue reading
  1224 Hits
  0 Comments

Welcome to the Interlink Cloud Blog

All content provided on this blog is for informational purposes only. The owner of this blog makes no representations or warranties regarding the information from our partners or other external sources.