Interlink Cloud Blog

Interlink Cloud Blog

Welcome to the Interlink Cloud Blog

All content provided on this blog is for informational purposes only. The owner of this blog makes no representations or warranties regarding the information from our partners or other external sources.
Karly Dwenger

ON-DEMAND WEBINAR: Azure Sentinel | Security Information & Event Management (SIEM) Reinvented

2019.08.29-Azure-Sentinel-webinar-LP-on-demand

security view webinar slides

Are you looking to simplify your security operations with one simple solution? 

Azure Sentinel is the answer.

With more sophisticated attacks, high volumes of alerts, long resolution timeframes, and unnoticed threats, IT security can be challenging. Azure Sentinel’s intelligent security analytics simplifies your security needs and enables you to easily:

  • Collect data across your enterprise
  • Analyze and detect threats quickly
  • Investigate and hunt for suspicious activities
  • Automate common tasks and threat response

In this exclusive on-demand webinar, Interlink covers Microsoft's Azure Sentinel and shows you just how easy it is to collect security data across your entire organization from devices and users to apps and servers on any cloud.

Continue reading
  2404 Hits
  0 Comments
Kirk Terrell

Microsoft’s BlueKeep Bug - Are You at Risk?

Microsofts-BlueKeep-Bug

Microsoft’s BlueKeep Bug Isn’t Getting Patched Quickly Enough

A serious bug is tearing its way through millions of PCs – known as BlueKeep, the bug is being compared to the famous WannaCry attack in 2017. BlueKeep is a hackable vulnerability in Microsoft’s Remote Desktop Protocol (RDP) that affects Windows 7 and earlier as well as older versions of Windows Server. It’s been a few weeks since Microsoft warned users about this crucial vulnerability in the common Windows protocol, and although the headlines may be fading, the bug is still lingering in at least 900,000 computers – who are getting Microsoft’s patch at a sluggish pace.

Continue reading
  1988 Hits
  0 Comments
Mark Dreyer

New Microsoft Security and Compliance Licensing Bundle Options

Microsoft-Security-Compliance-Licensing-Bundle

Get the same Security and Compliance Tools but Avoid Paying the Full Microsoft 365 Enterprise Price!

Does your organization have security and compliance needs, but you aren’t ready to pay for everything in the Microsoft 365 E5 Suite? 

This past February, Microsoft added new advanced security and compliance offering bundles to their price list. These packages are great for businesses who are not yet ready to use or to pay for the highest-end Microsoft365 E5 bundle – which runs at $57 per user. The new Identity & Threat Protection and Information Protection & Compliance offerings are designed to provide customers with a bundle of solid functionality without breaking the bank. These new bundles give customers a smaller set of features at a smaller cost. If your business is not quite ready to make the leap to a larger bundle, these new security and compliance bundles may be the right choice; get the features you need without paying more for other features you won’t use right now.

Continue reading
  4955 Hits
  0 Comments
Eric Brophy

Improve Your Credential Hygiene with the Local Administrator Password Solution (LAPS)

Local-Administrator-Password-Solution-LAPS

Keeping your organization secure is a top priority – so what is credential hygiene and why is it important?

Good credential hygiene means not exposing credentials on a potentially-compromised system when those credentials can be used to compromise other systems. Credentials can be a password, an account’s NTLM hash, or a Kerberos TGT. When these kinds of credentials are hacked, there is the potential for the entire company to be at risk. That’s where Microsoft’s Local Administrator Password Solution (LAPS) can come into play.

Continue reading
  2938 Hits
  0 Comments
Kirk Terrell

Office 365 Cloud App Security: Get Security Visibility in the Cloud

office-365-Cloud-App-Security

All the Cloud Controls You Have Been Waiting For

When company credentials have been compromised, all corporate data is instantly at risk. Hackers only need one victim to begin to access an entire organization – do you have a plan in place to prepare, detect or stop the threat before it’s too late?

Account compromise and credential harvesting attacks are occurring at alarming rates. In the event of a successful account compromise, time is crucial and the ability to respond quickly can significantly decrease the damage to your organization. Incident response teams should have a clear understanding of the steps involved in remediating unauthorized access events.  These steps should be clear and concise to avoid confusion and delayed containment. Microsoft helps with these steps by providing one single tool that covers many of the core incident response tasks.

Continue reading
  9250 Hits
  0 Comments

Welcome to the Interlink Cloud Blog

All content provided on this blog is for informational purposes only. The owner of this blog makes no representations or warranties regarding the information from our partners or other external sources.