Interlink Cloud Blog

Interlink Cloud Blog

Welcome to the Interlink Cloud Blog

All content provided on this blog is for informational purposes only. The owner of this blog makes no representations or warranties regarding the information from our partners or other external sources.
Mike Wilson

Securing Guest Access Without Paying More with Azure Active Directory B2B

Securing-Guest-Access----Azure-AD-B2B

Working with external companies and partner organizations just became a lot easier thanks to one of Azure AD’s service features: Azure AD Business-to-Business (B2B).

Companies always looking for solutions to improve their security and simplify collaboration. In today’s workplace, it’s very common for organizations to work with external partners. Office 365 is a great solution to collaborate with people both inside and outside your organizations, as it provides an easy way to share documents with external users or invite them to join your Microsoft Teams. Unfortunately, when you share using the default methods, your external users aren’t subject to the same security policies, such as multifactor authentication, that you’ve set up for your internal users. 

What most organizations are looking for is a way to manage external access that is predictable and consistent with their security practices. A hidden gem that is part of Azure Active Directory and solves this problem is leveraging Azure Active Directory B2B users. Azure AD B2B is not a different version of Active Directory, but just an additional feature that allows one organization to invite members from other organizations to share application access. This tool is beneficial not only for seamless collaboration, but it decreases the worry of security issues.

Continue reading
  557 Hits
  0 Comments
Nader Fattah

Take Control of Your Windows Updates with These Simple Solutions

Windows-Updates

With the most recent Windows update causing major issues with lost data for its users, people are beginning to feel weary of these automatic updates, so what can you do to manage them?

Windows updates are important—not only for security but to access new features and to fix any bugs… but that does not mean these updates have to be an annoying, intrusive or dangerous process.

Most recently, the Windows 10 October update had users reporting several wide-ranging issues caused by the update. The biggest complaint? Lost data and files. Yikes! Other complaints included issues with CPU usage and reduced battery life post update as well. Luckily, there are a few options to better manage these automatic updates to protect your data.

Depending on your industry, the size of your company and other factors, one solution may work better than others in your workplace. Look at these three solutions that allow you to be in charge of the timing of your updates. 

Continue reading
  330 Hits
  0 Comments
Aaron Seals

Skype for Business and Microsoft Teams Parity – True or False?

skype-for-business-microsoft-teams

Are you currently using Skype for Business and skeptical about a move to Microsoft Teams? You aren’t alone. Ever since Teams was released, there has been a huge push for feature parity between the two technologies due to concern that Teams will lack the same capabilities.

It’s been just over a year since the Teams launch, and Microsoft claims to have reached a true parity with Skype for Business (SfB). In the Microsoft July Update, Microsoft stated that most features minus a few Enterprise Voice features are still pending on the roadmap. However, upon close inspection, several native features are now referred out to 3rd party solutions (e.g. Whiteboard).

According to reviews and our Interlink experts, there is not a true parity between the two – yet. Teams has recently added a few key elements from Skype Online, that had previously been missing:

Continue reading
  548 Hits
  0 Comments
Max Donaldson

Changes to Microsoft’s Enterprise Agreement (EA) Might Have You Reconsidering Your Renewal

Microsofts-Enterprise-Agreement-EA

Big changes are on the horizon for Microsoft’s Enterprise Agreement (EA).

If your company is currently on an EA for licensing, you may need to rethink your renewal. Back in March of 2018, we published the blog article Microsoft Enterprise Agreement (EA) vs. Cloud Solution Provider (CSP) Licensing Agreement: What's Best for You? and due to the most recent and future changes, the time has come to revisit the topic. SMB customers that currently have a Microsoft Enterprise Agreement (EA will soon be faced with the decision –  or be forced – to say goodbye to the EA and hello to an alternative licensing program like Cloud Solution Provider (CSP).   

The EA has been the flagship licensing program for many years for companies with more than 250 users or devices looking to standardize their organizations on enterprise products like Windows OS, Office Pro, and the CAL Suites. The EA is beneficial because it offers support and other deployment and training benefits via Software Assurance as well as offering predictable pricing for the 3-year duration of the agreement. If you met that criteria, it was hard to argue why you wouldn’t sign up for an EA, as the discounts far superseded the alternatives. Another benefit with the EA is being able to mix on-premise products and cloud products on the same agreement, which was 100% cloud only until Server Subscriptions was recently added to Cloud Solution Provider Licensing Program (CSP). 

Continue reading
  965 Hits
  0 Comments
Eric Brophy

Prepare for Ransomware Attacks – What to Know

Ransomware-Attacks

Cyberattacks are starting to hit harder than ever – and they are hitting every sector.

Ransomware attacks are becoming more vicious and impactful to our clients. Here are some high-level thoughts on preparing for the next attack.

Ransomware attacks are nothing new, they have been around for ages – the first documented attack being in 1989 known as the AIDS Trojan. This attack set the stage for the more sophisticated attacks we are seeing more frequently today. Infections have steadily increased every year since 2013, reaching record levels last year in 2017.

Recently, these infections have become more advanced and more dangerous. Hackers are now making their software harder to detect. Attackers can now also combine attacks by crafting a software to first hack into a network and then build a second software to capture the keystrokes of the users. With these attacks becoming more complex, it is important to ensure your organization is actively working on security practices and adding layers of protection constantly.

Continue reading
  499 Hits
  0 Comments

Welcome to the Interlink Cloud Blog

All content provided on this blog is for informational purposes only. The owner of this blog makes no representations or warranties regarding the information from our partners or other external sources.