Is your data backup solution up to date?

Data backup technology has drastically evolved throughout the past decade to meet the rapidly increasing amount of business data.

Here’s a look at the latest in our backup solutions and how Interlinked can help your business get back up & running in a matter of seconds:

At Interlinked, we specialise in no hassle automated backup plans that offer cost effective data protection to ensure business continuity.

To learn more about protecting your business data, contact us today.

BI in Action: use of BI in the Healthcare Industry

The healthcare industry has moved into the data-driven world, and while there is more to be done, huge advancements have been made technologically. Business Intelligence (BI) is no longer something to be considered, it is a requirement.

BI allows healthcare providers to gain insight needed to reduce costs, increase revenue, and improve patient safety while remaining compliant with regulations. Additionally, BI increases visibility into financial operations, identifying both highly profitable and underused services, tracking cash flow, and generating compliance reporting.

Claims analysis, clinical analysis, and operational performance are also areas where BI may help lower costs. Utilising BI, healthcare providers can improve pricing, simplify claims processes, control costs, and optimise overall operational efficiency.

Patient Care and Satisfaction

Perhaps most importantly, BI can provide an immense amount of data to aid in improving patient outcomes. Physicians are provided with the information they need to monitor, as well as forecast, patient diagnoses. Some ways in which BI benefits patient care include:

  • Eliminate redundant tests: BI merges and provides all claims and the physician is able to access them via Electronic Health Records (EHR). This is the exact health records software the physician uses daily; therefore, the data gathered is delivered flawlessly. While with the patient, the physician sees each and every test and treatment the patient has received, both at that facility and elsewhere, as well as any remaining tests to be performed. Eliminating repeat tests helps save money and satisfies the patient who does not have to repeat the same test, due to missing information.
  • Personalised medication: Patient data is becoming more accessible and analysing the data is easier than ever before. Treatment regimens can now move from a one-size-fits-all category to a treatment based on each individual patient’s medical history and current medical concerns.
  • Prevention: Analysing genetic markers gives physicians the ability to prevent disease(s) or, at least reduce the impact of a disease on patients. Utilising big data, physicians can establish better insight on patterns of determinants that increase patients’ risk of disease. This information allows physicians the ability to recommend medications or advise patients about making lifestyle changes to reduce their overall risk of disease.


Using BI tools to analyse patient throughput, improve patient triage flow, and make improved decisions based on the population of the healthcare organisation, hospitals will know the ideal discharge times thus making the best use of bed space without sacrificing patient outcome. Furthermore, emergency and trauma patient cases can be more accurately prioritised and treated, improving patient outcomes while minimising costs by providing the correct treatment at the correct time.

There is absolutely no doubt BI currently plays and will continue to play, a crucial role in the future of the healthcare industry. With the ability to positively impact everyone in the industry – from patients to healthcare providers to executives – BI is a necessary component that rewards healthcare organisations with both clinical and financial success.

This is Part 3 of our Business Intelligence series. Please see below for links to all parts of the series.

Part 1: Introduction to Business Intelligence – Use Business Intelligence (BI) as your competitive advantage

Part 2: The latest BI trends

Part 3: BI in Action: use of BI in the Healthcare Industry

Empower your BI today with Interlinked – learn more here.

Office 365 updates for January 2018

2018 kicked off with some new updates to Office 365 apps across all devices. Microsoft Office’s CVP Kirk Koenigsbauer detailed some of the new Office 365 updates in a blog post.

Here’s a quick summary:

  • Get more out of Microsoft Teams: The biggest Microsoft Teams update so far brings a new app store for add-ons, support for slash commands, improved search, and more.
  • Office apps on Mac and iOS: Microsoft is bringing AutoSave support for Word, Excel, and PowerPoint to Office 365 subscribers on Mac devices, which means you will no longer have to manually save files that are stored on OneDrive. Co-authoring for Office apps on Mac and iOS also opened up general availability this month.
  • OneDrive for iOS: OneDrive is getting a huge update on iOS — including a refined look, support for drag-and-drop, support for iOS 11’s Files app, and more.
  • Education push: Last week, Microsoft announced some major education-focused update for the entire Office suite. The company is expanding Office’s Immersive Reader and other Learning Tools to more devices, including Mac devices. In related news, OneNote’s Class Notebook is getting support for two of the most popular school information systems.
  • New ways to Yammer: You can now share GIFs, post announcements to groups, and more using Yammer on mobile and desktop.

For more details, check out the full blog post from Microsoft.

Powerful features in Microsoft Office 365

Take advantage of the Microsoft Office 365 cloud suite with Interlinked’s free IT assessment. We will complete a full analysis report of your hardware, software and business needs and assess the compatibility of your IT environment with Office 365.

Team collaboration and documentation control

 SharePoint in Office 365 have introduced “co-authoring” where you can collaborate with as many people as you want on documents online. You can physically see the changes as they are being made.

To use this feature:

  1. Click on the top right where it says “share”
  2. Search and invite people to edit the document


  1. Click on the top right where it says “share”
  2. Copy the share link found in the “share dropdown” option and send it to whoever you’d like collaborating on the document

To communication with all the editors:

  1. Click on “email everyone”


  1. Click on “stop sharing”

Link files through email

 Instead of attaching the file to your email, Office 365 allows you to directly link to the file.

By emailing the direct link to the recipient, you give the recipient permission to edit and change the file.

Your notes will appear in your Outlook calendar

You can migrate your OneNote to-do list or planning project into your Outlook calendar. By migrating, you will have the ability to set up reminders, deadlines and keep on track.

To create Outlook tasks in OneNote:

  1. Select the words you like from your pre-made list of tasks
  2. In the menu that appears, click on “Outlook Tasks”
  3. Choose when you want to be reminded
  4. Search in “find tags” for your specific tasks
  5. Once your task is complete, you can click the tag to mark it as complete

 No more email clutter

Microsoft has introduced a folder in Outlook called “Clutter” which can be found in your “Inbox”. By moving less important emails, it will learn and adapt to the pattern to decipher which are important and no so important emails.

The emails will not be deleted and can be viewed at any time.

 Remove yourself out of “reply-all” email conversations

There is now an option called “ignore conversation” where you can remove yourself from “reply-all” emails. The emails will automatically be transferred into your “Deleted Items” folder.

To remove yourself out of “reply-all” email conversations:

  1. Choose an email conversation
  2. Click on “ignore” button in the top left navigation bar

Edit PDF

 You can edit a PDF document in Word:

  1. Choose PDF
  2. Go to “file”
  3. Click on “open in Word”

Contact us today for your free assessment.


Police issue warning about fake delivery emails

The ACCC’s Scamwatch has received over 4,300 complaints about a fake parcel delivery scam in 2016, more than triple the number received in 2015 which is targeting online shoppers.

“Scammers will use it to steal your personal information and lighten your wallet,” ACCC Deputy Chair Delia Rickard said.

“Scammers typically send emails pretending to be from Australia Post or FedEx, to try and trick you into believing you have an ‘undeliverable package’. In some cases, these emails may include your name and address and include legitimate-looking company information, complete with fake logos.”

“The email may threaten to charge you a fee for holding your ‘undelivered item’, and will ask you to open an attachment, click a link or download a file to retrieve your parcel. If you follow these instructions, you will likely download a ransomware virus that locks your computer.”

“To unlock your computer, scammers demand payment in the form of bitcoins (a form of online currency) or wire transfer. Even if you pay the fee, there is no guarantee that you will be able to access your computer again.

“Australia Post will never call you out of the blue to request payment or send you an email asking you to click on an attachment. If you receive an email about an undeliverable package, don’t open any attachments or download files – delete it straight away,” Ms Rickard said.

If you think your network has been compromised, please contact us immediately on 1300 302 207.

ISM 6.2.92 Data Wipe Method

ISM 6.2.92 is a software based data destruction program to overwrite existing information on a hard drive or other storage device.

The ISM 6.2.92 method will prevent most recovery methods from extracting information whether it be using hardware or software method of recovery.

ISM 6.2.92 is similar to other data wipe methods except that it’s the Australian government’s data sanitization standard.

What Does the ISM 6.2.92 Method Do?

The ISM 6.2.92 data sanitization method is implemented in the following way:

If a drive is under 15 GB in size, the ISM 6.2.92 specifies that the drive being sanitized must be overwritten three times with a random character.

If it didn’t complete properly, the software will prompt you to rerun the pass, or it might do so automatically.

More About ISM 6.2.92

The ISM 6.2.92 sanitization method was originally defined in the Information Security Manual (ISM) issued by the Australian Government.

The latest version of the ISM can be downloaded from the Australian Government Department of Defence website.

If you need help, do not hesitate to contact us today.

How To: Emails on Webmail

Learn how to view your emails on Webmail with Interlinked’s easy 7-step guide.

  1. Open your web browser.
  2. Go to
  3. Enter your full email address, for example
  4. Enter your password.
  5. Choose “Sign in”.
  6. Choose the “app launcher” in the upper right corner.
    Outlook-Webmail -1
  7. Choose “Mail”.
    Outlook-Webmail -2

Download a copy of how to view your emails on webmail here.

If you have any questions, please do not hesitate to contact us.

Security in the Cloud

When updating IT solutions, security is an immediate problem that comes to mind alongside cost and time.

In a previous post , we mentioned the outstanding security measures and procedures built into Azure. This week, we’re going to take a closer look at the security risks associated with public, private, and on-premises solutions. When building your IT solution, you’ll be choosing between them.

With good security measures in place, the location of your data matters less than how you access it. This is where securing networks, restricting access, and monitoring access come into play.

Below we explore some of the risks and benefits associated with each of your cloud options!


Risks Benefits
  • Data is stored on a shared server and maintained by provider
  • Users agree to terms of use and providers have access to data on servers
  • Network outages: Relies on access to internet in order for access to your data
  • Difficult to see where the data resides
  • Providers notify users of security breaches
  • For non-sensitive data, it’s cheap and easy to set-up
  • Can scale up or down as needed and pay accordingly
  • No cost of ownership, maintenance or upgrades – just operating cost


Risks Benefits
  • Data can be stored off prem, in a partitioned server owned by a host
  • Existing security tools can be affected when data volume increases
  • Meeting compliance requirements changes with two different regulatory environments
  • Replicate servers and data in even of disaster recovery
  • Configure on-prem and cloud servers can communicate on a private network.
  • Securely scale up or down as needed, including during maintenance


Risks Benefits
  • Siloed data can’t be recovered in the event of hardware damage or corruption
  • Employees can threaten security with malicious intent or misunderstanding
  • ·May take time to notice security breaches, leaving you vulnerable
  • Security is under your discretion, as are your employees
  • Complete ownership of data and server
  • Easier compliance with industry regulations

Take the time to examine your IT and understand if it meets the security standards that concern you right now. This step is the most important way to decide what you need from a cloud solution. If you need help, assessments are a great step towards identifying vulnerabilities, the best solutions, and migration-ready workloads.

Contact us for an assessment to build a more secure IT future!

New insights of IT trends to look out for in 2017

F5 Networks is bringing us into new insights of IT trends to look out for in 2017

In the next 12 months, organizations plan to deploy the following services:

  • Security services (40 percent)
  • Performance services (35 percent)
  • Availability services (34 percent)
  • Identity services (34 percent)
  • Mobility services (28 percent)

For this year’s report, F5 Networks surveyed 2,197 IT, networking, application and security professionals globally across a range of industry verticals.

Need a free IT assessment? Contact us today.

How To: Emails on iOS and Android

Learn how to view your emails on your iOS (Apple) and Android devices with Interlinked’s easy 8-step guide.

  1. Download and Install the App.
Outlook for iPhone or iPad requires iOS 8.0 or higher.

Download and install the Outlook for iOS app from the App Store.

You can also go to App Store on your phone and search for Microsoft Outlook.

Outlook for Android phone or tablet requires Android 4.0 or higher.

Download and install the Outlook app from the Google play.

You can also go to Play Store on your phone and search for Microsoft Outlook.

  1. Set up your account.
  2. After you’ve installed the Outlook app, tap to open it on your device.
  3. Tap “Add An Account” on iOS or “Get Started”on Android.
  4. Select Office 365.
  5. Follow the prompts and enter your full email address, for example
  6. Type your password, and then tap “Sign in”.
    If you get a time-out message, your password or other information might be incorrect. Retype the information, and then try again.
  7. Tap “Yes”to let the app access your info. Outlook begins syncing your data right after it connects to your account.

Download a copy of how to view your emails on your iOS (Apple) and Android devices with Interlinked’s easy 8-step guide here.

If you have any questions, please do not hesitate to contact us.