Interlink Cloud Blog

Interlink Cloud Blog

Welcome to the Interlink Cloud Blog

All content provided on this blog is for informational purposes only. The owner of this blog makes no representations or warranties regarding the information from our partners or other external sources.
Jimmy Smogor

Cybersecurity: Roadmap to a Secure Environment

Cybersecurity-roadmap-to-a-secure-environment

With an everchanging threat environment, organizations are struggling to keep up and protect their data and organization from security attacks. Learn how to stay ahead of attacks and start creating a more secure environment!
_________________________________

In a world with constantly changing threats, securing your information and organization can be challenging. Understanding where your organization’s security is and where you want it to be is crucial. Specific environment needs, along with the sensitivity of data, can vary tremendously from organization to organization. This article addresses how to understand your security landscape and steps to improve moving forward!

Ad Hoc Is No Longer Adequate for Effective Cybersecurity Protection

A common strategy used by security teams is to address threats and attacks on an ad hoc basis. While this may have worked in the past, organizations can no longer wait until an attack or threat happens to respond. Being proactive by staying ahead of attackers and phishing schemes is now vital for an organization’s security plan. Cybersecurity Ventures estimates that a ransomware attack is made on a business every 14 seconds!

Continue reading
  998 Hits
  0 Comments
Matt Scherocman

Is Office 365 HIPAA Compliant?

Yes. Microsoft® Office 365 provides all the capabilities you need to satisfy the technology requirements for HIPAA and HITECH compliance. These regulations require that organizations establish and document procedures that govern:hipaa compliant2

  • Restrict access to patient data.
  • How patient data is handled.
  • How stored patient data is kept secure.
  • How to secure patient data when it’s transmitted.

Meeting these general guidelines requires lots of time and attention to detail. Office 365 helps you meet these requirements with less time and cost than you might think.

Continue reading
  14252 Hits
  0 Comments
Eric Brophy

What is the HeartBleed Vulnerability?

In recent days we have had a lot of questions from clients who were concerned their information may have been compromised in Office 365 by the HeartBleed vulnerability.  This flaw allows intruders to read server memory which would contain usernames, passwords, credit cards, or any other confidential information that may be on the server running OpenSSL.  We wanted to take a minute to reassure you that Office 365 and out of the box Microsoft configurations are not affected. 

The Heartbleed vulnerability is specific to OpenSSL which is not being used for any Microsoft Office 365 services.  In fact, all Microsoft servers (Windows Server 2003 through Windows Server 2012 R2) do not utilize OpenSSL out of the box and use their own encryption component called Secure Channel (or SChannel which you may have seen errors in your event log for).  Unless you have installed Apache or some other third-party application that uses OpenSSL on your Windows Server, you should be fine.  Microsoft will continue actively monitor the security of Office 365 with threat modeling and attack surface analysis.  We continue to believe security is a benefit of the Microsoft cloud services that goes above and beyond what a typical business can do and it is not a weakness. 

For additional information please reference this article from Microsoft

Continue reading
  4568 Hits
  0 Comments

Welcome to the Interlink Cloud Blog

All content provided on this blog is for informational purposes only. The owner of this blog makes no representations or warranties regarding the information from our partners or other external sources.