Interlink Cloud Blog

Interlink Cloud Blog

Welcome to the Interlink Cloud Blog

All content provided on this blog is for informational purposes only. The owner of this blog makes no representations or warranties regarding the information from our partners or other external sources.
Karly Dwenger

ON-DEMAND WEBINAR | Skype to Teams: Developing a Migration Strategy

2019.05.14-Skype-to-Teams-Webinar-on-demand

view webinar slides teams webinar

Ready or Not - Microsoft Teams is taking over!
Do You Have a Plan?

There’s a major shift coming up for companies using Skype for Business, and whether they’re ready or not, Microsoft Teams will be taking over. There has been a lot of improvement since Teams first rolled out, and Microsoft announced they would be phasing out Skype. The roadmap for this integration is complete, and Teams is now the go-to solution for collaboration services. However, we know that with this big shift companies will inevitably have questions and concerns.

Upgrading from Skype for Business is more than just a technical migration – it will be a transformation in how your users communicate, and change is not always easy. It's time to start planning your path to Teams today – Microsoft recommends upgrading quickly as possible to optimize your benefits and ease the transition. 

To help you develop a migration strategy and to answer commonly asked questions, Interlink is providing you with an on-demand webinar that you can watch at your own convenience.

Continue reading
  1235 Hits
  0 Comments
Eric Brophy

Improve Your Credential Hygiene with the Local Administrator Password Solution (LAPS)

Local-Administrator-Password-Solution-LAPS

Keeping your organization secure is a top priority – so what is credential hygiene and why is it important?

Good credential hygiene means not exposing credentials on a potentially-compromised system when those credentials can be used to compromise other systems. Credentials can be a password, an account’s NTLM hash, or a Kerberos TGT. When these kinds of credentials are hacked, there is the potential for the entire company to be at risk. That’s where Microsoft’s Local Administrator Password Solution (LAPS) can come into play.

Continue reading
  2450 Hits
  0 Comments
Max Donaldson

Is Your Microsoft Enterprise Agreement (EA) Renewal Coming Up?

Enterprise-Agreement---EA

For many companies, the end of their Microsoft EA is coming up this June, and it’s time to think about renewal or alternate options like A Cloud Solution Provider (CSP).

Choice is critical in business, but sometimes it’s difficult to determine the best decision for your specific organization. Such is the case when it comes to contracting services for Azure and your other Microsoft cloud applications. For many years, the best choice for larger organizations was signing up for an Enterprise Agreement (EA) directly with Microsoft. However, now there is a new option called Cloud Service Provider (CSP), a contract you can purchase from a certified Microsoft partner like Interlink.

Both offer similar services and similar pricing. There are advantages and disadvantages to both depending on your size and type of business. So, how do you decide what’s the right choice for your organization? Below is a look at the two options in several key areas.

Continue reading
  2613 Hits
  0 Comments
Matt Scherocman

File Servers Are Painful – What Are File Server Alternatives?

file-server-alternatives

Nobody likes file servers. They are often in a state of chaos and accessing them from a mobile device is nearly impossible. Virtual private networks (VPNs) only work well on PCs and even then, we find users crossing their fingers every time they go to connect. Thankfully there are new options for sharing and collaborating on files. 

Here is a quick primer on some of the best new file server alternatives:

OneDrive for Business/Groups

Continue reading
  4169 Hits
  0 Comments
Kirk Terrell

Office 365 Cloud App Security: Get Security Visibility in the Cloud

office-365-Cloud-App-Security

All the Cloud Controls You Have Been Waiting For

When company credentials have been compromised, all corporate data is instantly at risk. Hackers only need one victim to begin to access an entire organization – do you have a plan in place to prepare, detect or stop the threat before it’s too late?

Account compromise and credential harvesting attacks are occurring at alarming rates. In the event of a successful account compromise, time is crucial and the ability to respond quickly can significantly decrease the damage to your organization. Incident response teams should have a clear understanding of the steps involved in remediating unauthorized access events.  These steps should be clear and concise to avoid confusion and delayed containment. Microsoft helps with these steps by providing one single tool that covers many of the core incident response tasks.

Continue reading
  8359 Hits
  0 Comments

Welcome to the Interlink Cloud Blog

All content provided on this blog is for informational purposes only. The owner of this blog makes no representations or warranties regarding the information from our partners or other external sources.