Category: Cybersecurity

  • Data Protection Security PT. 2

    Welcome back! Today we’ll continue with our Data Protection Security series by talking more in-depth about the different ways to protect data. If you haven’t had the opportunity to read the first part of the series, Data Protection Security, take a few minutes to check it out when you can.…

  • What is Transparent Snapshot?

    Hey! It’s Sevan and thanks for reading. If this is your first time reading a blog written by me, check out my previous blog on data protection security, the link to the blog will be listed below. Have you been working with Virtual Machines (VM) farm and attempting to do…

  • Cyber Security, Hardware vulnerability, and Raptors

    Most people who have worked in IT for any significant length of time are at least familiar with some basic cyber security principles. Likewise, the average consumer is aware on a basic level that a threat exists and incorporating some level of protection is a prudent countermeasure. When my Dad…

  • Data Protection Security

    Data Protection Security

    I’ve been asked numerous times, “What is data protection?”, so I decided to take you through an adventure of data protection. Hello, I’m one of the newest team members of the GEOS team. I’ve been assigned to become a subject matter expert on data protection. Data protection can be difficult…