Interlink Cloud Blog

Interlink Cloud Blog

Welcome to the Interlink Cloud Blog

All content provided on this blog is for informational purposes only. The owner of this blog makes no representations or warranties regarding the information from our partners or other external sources.
Matt Scherocman

What Data Security and Compliance is Built into Office 365?

Security is at the heart of Office 365.  Here are some great bullet points from a recent Microsoft blog listing.  Check out the full article here:  http://blogs.office.com/b/office365tech/archive/2013/10/23/cloud-services-you-can-trust-security-compliance-and-privacy-in-office-365.aspx
Built-in capabilities

    • Physical security - We monitor our data centers 24/7 and we have technologies and processes to protect our data centers from unauthorized access or natural disasters
    • Security best practices -We use best practices in design like Secure Development Lifecycle and operations like defense-in-depth to keep your data secure in our data centers
    • Data encryption - Every customers' email content is encrypted at rest using BitLocker Advanced Encryption Standard (AES) encryption
    • Secure network layer - Our networks are segmented, providing physical separation of critical back-end servers from the public-facing interfaces at the same time our Edge router security detects intrusions and signs of vulnerability
    • Automated operations like Lock Box processes - Access to the IT systems that store customer data is strictly controlled via lock box processes. This access control mechanism is similar to a system where two people have to turn the key for an action to be allowed.

Compliance

    • Independently Verified - Third party audits verify that Office 365 meets many key world-class industry standards and certifications
    • Control framework - We follow a strategic approach of implementing extensive standard controls that in turn satisfy various industry regulations. Office 365 supports over 600 controls that enable us to meet complex standards and offer contracts to customers in regulated industries or geographies, like ISO 27001, the EU Model Clauses, HIPAA Business Associate Agreements, FISMA/FedRAMP
    • Comprehensive Data Processing Agreement - Our Data Processing Agreement comprehensively addresses privacy and security of customer data, helping customers comply with local regulations

Privacy

    • No Advertising - We do not scan email, documents, build analytics or data mine to build advertising products. In fact, we do not use your information for anything other than providing you services you have subscribed for.
    • Data Portability - As an Office 365 customer, your data belongs to you, and you can export your data at any time with no restrictions. We act only as a data processor and provider of productivity services, not as a data owner
    • Notice and Consent - When we act upon your data, we let you know why and we ask for permission in advance or redirect any inquiries to our customers unless legally prevented to do so.
    • Breach Response - We have strong, tested and audited processes to inform you if there is a breach and re-mediate issues if they occur.
    • Data Minimization - We strive to minimize the actual amount of customer data that our internal teams have access to.


This posting is provided “AS IS” with no warranties, and confers no rights.

Continue reading
  4745 Hits
  0 Comments
Matt Scherocman

What Reports Does Microsoft Have Available For Monitoring Skype for Business Usage?

Microsoft has NEW Lync Reporting in Office 365.

These reports help you to visualize lync usage throughout your business.

Follow the link below for more information:

http://blogs.office.com/b/office365tech/archive/2013/10/03/visualize-lync-usage-for-your-business-with-new-reports.aspx

This posting is provided “AS IS” with no warranties, and confers no rights

Continue reading
  4074 Hits
  0 Comments
Matt Scherocman

What Are The Different Options for Microsoft Office?

 

The following chart highlights the differences/similarities between Microsoft Office Products, to help you better understand what product will best fit your needs.


 b2ap3_thumbnail_office-365-versions-2.PNG_20140414-190552_1.jpg
 
For more information on each, please see the links below:
Traditional Office Pro
Office 365 Pro Plus
Office Web Apps
Office Mobile


 This posting is provided “AS IS” with no warranties, and confers no rights.

 

Continue reading
  4781 Hits
  0 Comments
Matt Scherocman

Does Microsoft Have Training for Skype for Business?

Microsoft has a free program for End User Lync Training (See link Below)
Designed as 30- to 60-minute learning modules, these engaging sessions enable users to focus their attention on one workload at a time, expediting their learning curve, building confidence, and improving their overall experiences with Lync.
Examples of current course offerings include:

    • Lync Daily Demo: a high-level overview of Lync’s capabilities, designed for those evaluating or just getting started with Lync
    • Contacts and Conversations: a deep look at how to optimize Lync’s instant messaging and presence capabilities
    • Enterprise Voice Basics: an overview of using Lync’s enterprise voice features
    • Online Meeting Basics: an introduction to scheduling and presenting Lync meetings
    • Present Like a Pro: an advanced class designed to hone one’s Lync presentation skills


Action Maximize your Lync adoption potential with these complimentary, instructor-led, online training courses. www.aka.ms/LyncLearning.
This posting is provided “AS IS” with no warranties, and confers no rights.

Continue reading
  3259 Hits
  0 Comments
Matt Scherocman

What Are The Top 10 Questions to Ask Your Cloud Service Provider?

Microsoft has identified the key privacy and security considerations to help you determine the cloud service provider that meets your security expectations.

A few examples taken from "The Top 10 Trust Tenets" article:

    1. Who owns the data I put in your service?
    1. Where is my data located?
    1. How is my data protected from external attacks?
    1. Can I get my data out of your service whenever I want?
    1. Will you use my data to build advertising products?


This article address many of the questions and concerns of moving to the cloud.
Click here to find the answers and access the article online
Other topics found in this article include:

    • Top 10 privacy and security features of Office365
    • Top 10 contracts, certifications, standards, and regulations that enable compliance

This posting is provided “AS IS” with no warranties, and confers no rights.

Continue reading
  4162 Hits
  0 Comments

Welcome to the Interlink Cloud Blog

All content provided on this blog is for informational purposes only. The owner of this blog makes no representations or warranties regarding the information from our partners or other external sources.