Interlink Cloud Blog

Interlink Cloud Blog

Welcome to the Interlink Cloud Blog

All content provided on this blog is for informational purposes only. The owner of this blog makes no representations or warranties regarding the information from our partners or other external sources.
Mike Wilson

Windows Information Protection (WIP) | Avoid Data Leaks by Automatically Classifying and Protecting Files

Windows-Information-Protection---WIP

Windows Information Protection (WIP) is a data loss prevention feature for Windows 10 (version 1607 or later) that can automatically apply protective tags for files and data. Thus, allowing end-users to be productive and still keep your organization’s data secure!
______________________________________________

What is Windows Information Protection (WIP)?

Windows Information Protection (WIP) is an alternative to traditional data loss prevention approaches that focus on protecting data leakage at the network level. WIP protects against both accidental and intentional leakage of data by automatically encrypting internal data anytime users save a file locally to a protected Windows 10 system. Protecting organizational data is critical - now more than ever before! Lawsuits, legal challenges, and/or a loss of reputation is at stake if an organization is not successful in protecting their data. The ongoing blend of work and home life – especially in a COVID-19 world isn’t making that easier. More and more, we see end-users utilizing their work provided devices for personal tasks and data management. Similarly, end-users will access organizational data on their personal devices, which makes protecting your data tricky. WIP provides peace of mind and helps protect critical data regardless of where it’s accessed from. WIP not only helps protect files on end-users’ devices but can also be used to remotely wipe a device clean if needed via Intune. By selecting the user and device and sending a wipe request, all data that was protected via the WIP policy will become unusable.

Continue reading
  196 Hits
  0 Comments
Max Donaldson

Azure Pricing – How to Get Your Best Deal

azure-pricing-best-deal

Learn how to get the best deal with Windows Server Hybrid Use Benefit, SQL Server Hybrid Use Benefit, Server Subscriptions, and Reserved Instances. 

We’ve seen a lot of people simply paying too much!

____________________________________________

Azure pricing can be confusing...

Many companies are struggling to understand how to get their best deal when running Azure workloads. Microsoft has programs that organizations should be taking advantage of. In this article, we’ll discuss the four major ways to get a programmatic discount on Azure that can save your organization money when compared to pay-as-you-go pricing.

A few years ago, Microsoft announced a price cut on Azure which made pricing between the various licensing vehicles all the same. Then they also gave guidance to their sales teams not to discount Azure until the customer commitment was in the millions. So, it is critical to take advantage of these programmatic discounts to get the best deal possible.

Continue reading
  4746 Hits
  0 Comments
Matt Scherocman

On-Demand Webinar | Demystifying Microsoft Cloud Licensing

on-demand-webinar-Demystifying-Microsoft-Cloud-Licensing-header

view webinar licensing

Microsoft licensing confuses many businesses...

Often, this lack of understanding causes organizations to license more products than necessary and/or buy the wrong licensing, resulting in unnecessary spending.

In this exclusive on-demand webinar, Interlink's Microsoft licensing gurus demystify the confusion around Microsoft Licensing. View today, and get a good overview of Modern Workplace Offerings - including Office 365, Windows, Security, Compliance, and more.

Continue reading
  1062 Hits
  0 Comments
Mark Dreyer

Conditional Access: Important Baseline Announcement

MFA-Conditional-Access-Baseline-Announcement

Make sure your organization is ready for changes to Conditional Access Baseline Protections!
___________________

Recently, Microsoft announced an update to Conditional Access policies regarding security. Read to learn what will be replacing Security Defaults, and how to turn it on!

Baseline Protections Update  

Microsoft currently has Baseline Protection Policies in place with Conditional Access in order to protect organizational accounts. Baseline Protections will stop being enforced on February 29th, 2020 and be replaced with Security Defaults. Security Defaults are a set of basic identity security mechanisms recommended by Microsoft. New tenants will automatically have these enabled, but existing tenants will require action. When enabled, these recommendations will automatically be enforced in your organization. Administrators and users will be better protected from common identity-related attacks – but you must be sure to enable these features! View the Microsoft announcement Introducing Security Defaults, which explain this.

If you are currently using Conditional Access and want to set up the equivalent policies in place of baseline, contact us today!

Continue reading
  1693 Hits
  0 Comments
Mark Dreyer

Multi-Factor Authentication (MFA) & Conditional Access

Multi-Factor-Authentication-Conditional-Access

Learn how to take advantage of these services from Azure Active Directory!
__________________

Recently, Microsoft started to offer a free cloud-based Azure Active Directory Multi-Factor Authentication. In addition, you can gain many premium features such as branding, password protection, hybrid identities, group access management, conditional access, and identity protect & governance with different paid versions. Read on to find out which version is best for your organization and how a deployment will best optimize your organization!

What is Multi-Factor Authentication (MFA)?  

At the basic level, Multi-Factor Authentication has added security in a two-step verification process. This introduces a significant challenge to attackers because even if an attacker manages to learn a user’s credentials, it is useless without also having an additional authentication method. The combination of these can be a trusted and not easily duplicated device (such as a registered cellphone), biometrics like facial recognition or fingerprint access, or a domain-joined PC.

Continue reading
  2206 Hits
  0 Comments

Welcome to the Interlink Cloud Blog

All content provided on this blog is for informational purposes only. The owner of this blog makes no representations or warranties regarding the information from our partners or other external sources.