Interlink Cloud Blog

Interlink Cloud Blog

Welcome to the Interlink Cloud Blog

All content provided on this blog is for informational purposes only. The owner of this blog makes no representations or warranties regarding the information from our partners or other external sources.
Mike Wilson

Securing Guest Access Without Paying More with Azure Active Directory B2B


Working with external companies and partner organizations just became a lot easier thanks to one of Azure AD’s service features: Azure AD Business-to-Business (B2B).

Companies always looking for solutions to improve their security and simplify collaboration. In today’s workplace, it’s very common for organizations to work with external partners. Office 365 is a great solution to collaborate with people both inside and outside your organizations, as it provides an easy way to share documents with external users or invite them to join your Microsoft Teams. Unfortunately, when you share using the default methods, your external users aren’t subject to the same security policies, such as multifactor authentication, that you’ve set up for your internal users. 

What most organizations are looking for is a way to manage external access that is predictable and consistent with their security practices. A hidden gem that is part of Azure Active Directory and solves this problem is leveraging Azure Active Directory B2B users. Azure AD B2B is not a different version of Active Directory, but just an additional feature that allows one organization to invite members from other organizations to share application access. This tool is beneficial not only for seamless collaboration, but it decreases the worry of security issues.

Continue reading
  15011 Hits
Nader Fattah

Take Control of Your Windows Updates with These Simple Solutions


With the most recent Windows update causing major issues with lost data for its users, people are beginning to feel weary of these automatic updates, so what can you do to manage them?

Windows updates are important—not only for security but to access new features and to fix any bugs… but that does not mean these updates have to be an annoying, intrusive or dangerous process.

Most recently, the Windows 10 October update had users reporting several wide-ranging issues caused by the update. The biggest complaint? Lost data and files. Yikes! Other complaints included issues with CPU usage and reduced battery life post update as well. Luckily, there are a few options to better manage these automatic updates to protect your data.

Depending on your industry, the size of your company and other factors, one solution may work better than others in your workplace. Look at these three solutions that allow you to be in charge of the timing of your updates. 

Continue reading
  4395 Hits
Eric Brophy

Prepare for Ransomware Attacks – What to Know


Cyberattacks are starting to hit harder than ever – and they are hitting every sector.

Ransomware attacks are becoming more vicious and impactful to our clients. Here are some high-level thoughts on preparing for the next attack.

Ransomware attacks are nothing new, they have been around for ages – the first documented attack being in 1989 known as the AIDS Trojan. This attack set the stage for the more sophisticated attacks we are seeing more frequently today. Infections have steadily increased every year since 2013, reaching record levels last year in 2017.

Recently, these infections have become more advanced and more dangerous. Hackers are now making their software harder to detect. Attackers can now also combine attacks by crafting a software to first hack into a network and then build a second software to capture the keystrokes of the users. With these attacks becoming more complex, it is important to ensure your organization is actively working on security practices and adding layers of protection constantly.

Continue reading
  3737 Hits
Eric Brophy

Multi-Factor Authentication and Why It’s Important

Multi-Factor Authentication

Multi-Factor Authentication in Office 365 and the Enterprise Mobility + Security Suite

Microsoft reported in their breach investigation report that over 75% of network intrusions originated from exploited weak or stolen credentials. So, how can companies protect against threats from hackers who are trying to access their data? 

Microsoft’s Multi-Factor Authentication (MFA) helps stop hackers through a process of authentication. It requires the use of more than one verification method and adds a second layer of security to user sign-ins and identity transactions. With MFA in place,hackers do not have access to the second-factordevice to login. The additional verification methods can include SMS text verification, mobile app approval or a phone call (with or without a pin). The end user experience can be improved by not promptinga second factor when they are on a trusted network or using a domain joined PC.

Continue reading
  8389 Hits
Eric Brophy

Azure AD Password Protection & Smart Lockout Now in Public Preview


Azure AD Password Protection helps eliminate easily guessed passwords from the environment, which can dramatically lower the risk of being compromised by attackers. It also protects by preventing users from setting their passwords to common, weak and risky passwords and prevents bad actors from trying to brute force attack those accounts.

Many attackers know how users create passwords, and more often than not, businesses ldo not have a security policy in place around user created passwords. Therefore, Azure AD Password Protection would be beneficial for any business that wants to improve their network security and prevent data loss through user identity compromise.

Continue reading
  3908 Hits

Welcome to the Interlink Cloud Blog

All content provided on this blog is for informational purposes only. The owner of this blog makes no representations or warranties regarding the information from our partners or other external sources.