article thumbnail

The 7 Best Data Protection Officer Certifications Online for 2023

Solutions Review

Data protection is a broad field encompassing backup and disaster recovery, data storage, business continuity, cybersecurity, endpoint management, data privacy, and data loss prevention. Platform: Coursera Description: A growing number of exciting, well-paying jobs in today’s security industry do not require a college degree.

article thumbnail

Storage and Data Protection News for the Week of February 23: Updates from Clumio, Constellation Research, Hitachi Vantura, and More

Solutions Review

million eye care patients are being notified that their Social Security numbers and other confidential information were compromised when hackers orchestrated a cyber-attack against Medical Management Resource Group, L.L.C. Under the alliance, Kyndryl will now be a Veeam Accredited Service Partner (VASP). Million Approximately 2.3

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Pioneering Cloud Partnership: e-finance and Pure Storage Bring Innovation to the Egyptian Market

Pure Storage

From persistent storage and data protection to disaster recovery, data security, cross-cloud, and data migrations, to automated capacity management tailored for applications hosted on Kubernetes, e-finance is poised to deliver a holistic and future-ready approach to cloud storage.

article thumbnail

Veeam Data Protection: Remote Control for Remote Work

OffsiteDataSync

Still, critical data can be stored locally on home workstations, laptops and other devices, making backup crucial for protecting against lost data, corruption, malware and disasters. Also, check out our ebook: Backup & Disaster Recovery Strategies for the New World of Work. Veeam delivers both with secure access.

Backup 52
article thumbnail

The Best Risk Management Courses on Pluralsight to Consider Taking

Solutions Review

Rogers is an information security engineer working as a contractor for Department of Defense agencies. OUR TAKE: This class, taught by Kevin Henry, is directed at intermediate-level students, particularly those interested in becoming information security professionals. Next, you will compare the various methods of risk assessment.