Interlink Cloud Blog

Interlink Cloud Blog

Welcome to the Interlink Cloud Blog

All content provided on this blog is for informational purposes only. The owner of this blog makes no representations or warranties regarding the information from our partners or other external sources.
Karly Dwenger

ON-DEMAND WEBINAR | Security on a Tight Budget

Security-on-a-Tight-Budget-on-demand

security view webinar slides

Do you need to invest in better security without overspending?

Keeping your company compliant and secure should be a top priority. Have you been holding back on updating your security solutions with the fear of going over budget? Are you looking for ways to cut costs while still getting the best security has to offer? This webinar can help!

In this on-demand event, you’ll hear an in-depth discussion on best security recommendations on a budget while exploring Microsoft's new, money-saving security and compliance bundles.

Continue reading
  1949 Hits
  0 Comments
Mike Wilson

Securing Guest Access Without Paying More with Azure Active Directory B2B

Securing-Guest-Access----Azure-AD-B2B

Working with external companies and partner organizations just became a lot easier thanks to one of Azure AD’s service features: Azure AD Business-to-Business (B2B).

Companies always looking for solutions to improve their security and simplify collaboration. In today’s workplace, it’s very common for organizations to work with external partners. Office 365 is a great solution to collaborate with people both inside and outside your organizations, as it provides an easy way to share documents with external users or invite them to join your Microsoft Teams. Unfortunately, when you share using the default methods, your external users aren’t subject to the same security policies, such as multifactor authentication, that you’ve set up for your internal users. 

What most organizations are looking for is a way to manage external access that is predictable and consistent with their security practices. A hidden gem that is part of Azure Active Directory and solves this problem is leveraging Azure Active Directory B2B users. Azure AD B2B is not a different version of Active Directory, but just an additional feature that allows one organization to invite members from other organizations to share application access. This tool is beneficial not only for seamless collaboration, but it decreases the worry of security issues.

Continue reading
  8807 Hits
  0 Comments
Nader Fattah

Take Control of Your Windows Updates with These Simple Solutions

Windows-Updates

With the most recent Windows update causing major issues with lost data for its users, people are beginning to feel weary of these automatic updates, so what can you do to manage them?

Windows updates are important—not only for security but to access new features and to fix any bugs… but that does not mean these updates have to be an annoying, intrusive or dangerous process.

Most recently, the Windows 10 October update had users reporting several wide-ranging issues caused by the update. The biggest complaint? Lost data and files. Yikes! Other complaints included issues with CPU usage and reduced battery life post update as well. Luckily, there are a few options to better manage these automatic updates to protect your data.

Depending on your industry, the size of your company and other factors, one solution may work better than others in your workplace. Look at these three solutions that allow you to be in charge of the timing of your updates. 

Continue reading
  2970 Hits
  0 Comments
Eric Brophy

Prepare for Ransomware Attacks – What to Know

Ransomware-Attacks

Cyberattacks are starting to hit harder than ever – and they are hitting every sector.

Ransomware attacks are becoming more vicious and impactful to our clients. Here are some high-level thoughts on preparing for the next attack.

Ransomware attacks are nothing new, they have been around for ages – the first documented attack being in 1989 known as the AIDS Trojan. This attack set the stage for the more sophisticated attacks we are seeing more frequently today. Infections have steadily increased every year since 2013, reaching record levels last year in 2017.

Recently, these infections have become more advanced and more dangerous. Hackers are now making their software harder to detect. Attackers can now also combine attacks by crafting a software to first hack into a network and then build a second software to capture the keystrokes of the users. With these attacks becoming more complex, it is important to ensure your organization is actively working on security practices and adding layers of protection constantly.

Continue reading
  2179 Hits
  0 Comments
Eric Brophy

Multi-Factor Authentication and Why It’s Important

Multi-Factor Authentication

Multi-Factor Authentication in Office 365 and the Enterprise Mobility + Security Suite

Microsoft reported in their breach investigation report that over 75% of network intrusions originated from exploited weak or stolen credentials. So, how can companies protect against threats from hackers who are trying to access their data? 

Microsoft’s Multi-Factor Authentication (MFA) helps stop hackers through a process of authentication. It requires the use of more than one verification method and adds a second layer of security to user sign-ins and identity transactions. With MFA in place,hackers do not have access to the second-factordevice to login. The additional verification methods can include SMS text verification, mobile app approval or a phone call (with or without a pin). The end user experience can be improved by not promptinga second factor when they are on a trusted network or using a domain joined PC.

Continue reading
  4027 Hits
  0 Comments

Welcome to the Interlink Cloud Blog

All content provided on this blog is for informational purposes only. The owner of this blog makes no representations or warranties regarding the information from our partners or other external sources.