With tax season 2022 fast approaching, how are you doing with final stretch preparations? While many core processes will be repeated with the deftness and confidence that only years of…
What is the Log4j vulnerability? On December 9, a remote code execution (RCE) vulnerability was identified in Java logging library Apache Log4j, which is a ubiquitous software component used throughout…
The data security layer is about protecting the data you have. It includes the different cybersecurity practices that you use to secure your data and prevent data breaches and misuse.…
Microsoft’s Power Platform is a low-code platform or set of tools that provides a way to create applications, data visualization, workflow, and automation in an accessible and familiar environment –…
Data Security: Protecting sensitive data from unauthorized access In Security Lesson #1, we talked about the importance of a business impact analysis and the nine questions you need to ask…
This summer has been a whirlwind of meetings and conferences, most of them in person as a refreshing change. As the COVID Delta Variant threatens to send us backward in…
While we miss the buzz and adhoc interactions with likeminded partners working in equal earnest to position themselves for the ever-expanding digital transformation opportunity, this year’s Inspire started off on…
Recently, we sat down with our newest executive team member Kshitij Kathuria, who joined recently as Netgain’s new Chief Information Security Officer. In this interview, we discussed the meaning of…
Windows Virtual Desktop to Azure Virtual Desktop: Is it just rebranding or something more? Ahead of next month’s Inspire conference (Microsoft’s annual partnership event), Microsoft recently announced a rebranding of…
In looking at the marketing collateral for most service providers, one cannot help but notice that the “partner” keyword is sprinkled across quite a few places. Yet rarely does one…
In my discussions with our clients, I often hear that we are a “seamless extension of their IT”, not a replacement. This is especially gratifying given the increasingly complex and…
This post on questions that drive your cybersecurity strategy is the third post in our new Security Lessons series. To start from the beginning, read “What we learned as a…