{"id":504542,"date":"2023-12-15T08:32:26","date_gmt":"2023-12-15T13:32:26","guid":{"rendered":"https:\/\/www.commvault.com\/?page_id=504542"},"modified":"2023-12-15T08:40:38","modified_gmt":"2023-12-15T13:40:38","slug":"best-practices-for-protecting-your-data","status":"publish","type":"page","link":"https:\/\/www.commvault.com\/gc\/best-practices-for-protecting-your-data","title":{"rendered":"Best Practices for Protecting your Data"},"content":{"rendered":"<div class=\"style-side-image wp-block-commvault-v2-hero\">\n\t<div class=\"wp-block-commvault-v2-hero__container\">\n\t\t\t\t\t<div class=\"wp-block-commvault-v2-hero__breadcrumbs\">\n\t\t\t\t<ul class=\"new-breadcrumbs\"><li><a href=\"https:\/\/www.commvault.com\">Home<\/a><\/li> <svg width=\"12\" height=\"13\" viewBox=\"0 0 12 13\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t<path d=\"M1 2.5L5 6.5L1 10.5M7 2.5L11 6.5L7 10.5\" stroke=\"currentcolor\" stroke-width=\"1.2\"\/><\/svg> <li><a href=\"https:\/\/www.commvault.com\/gc\">Gated Content<\/a><\/li> <svg width=\"12\" height=\"13\" viewBox=\"0 0 12 13\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t<path d=\"M1 2.5L5 6.5L1 10.5M7 2.5L11 6.5L7 10.5\" stroke=\"currentcolor\" stroke-width=\"1.2\"\/><\/svg> <li>Best Practices for Protecting your Data<\/li><\/ul>\t\t\t<\/div>\n\t\t\n\t\t\n\t\t\n\t\t<h1 class=\"title text-heading-l text-md-heading-l text-lg-heading-xxl text-xl-heading-xxxl\">\n\t\t\tCybersecurity for Higher Education: Best Practices for Protecting your Data\t\t<\/h1>\n\n\t\t<p class=\"subheading text-body-m text-xl-body-l\">\n\t\t\tThis webinar will provide higher education IT professionals and data security personnel with the information they need to ensure the security of their institutions&#8217; data and intellectual property.\t\t<\/p>\n\n\t\t<div class=\"wp-block-commvault-v2-hero__cta-wrapper scalable-cta-button\">\n\t\t\t\n\n<div class=\"is-style-primary wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"#downloadnow\"\n\t\t\taria-label=\"Watch now\"\n\t\t\ttarget=\"_self\"\n\t\t>\n\n\t\t\t\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tWatch now\t\t\t\t<\/span>\n\t\t\t\t<svg width=\"17\" height=\"18\" viewBox=\"0 0 17 18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M12.8788 8.00008L7.08586 2.20718L8.50008 0.792969L16.7072 9.00008L8.50008 17.2072L7.08586 15.793L12.8788 10.0001H0.292969V8.00008H12.8788Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\n\t\t<\/div>\n\t<\/div>\n\t\t\t<div class=\"wp-block-commvault-v2-hero__side-image\">\n\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"650\" height=\"650\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2023\/12\/GatedLP_HigherEd-Cybersecurity-Webinar-1_650x650-1.jpg?quality=80\" class=\"wp-block-commvault-v2-hero__image\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2023\/12\/GatedLP_HigherEd-Cybersecurity-Webinar-1_650x650-1.jpg 650w, https:\/\/www.commvault.com\/wp-content\/uploads\/2023\/12\/GatedLP_HigherEd-Cybersecurity-Webinar-1_650x650-1.jpg?resize=300,300 300w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/>\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-1 wp-block-columns-is-layout-flex\" id=\"downloadnow\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<h2 class=\"wp-block-heading\" id=\"h-data-is-everywhere-and-it-s-your-institution-s-most-valuable-asset\">Data is everywhere, and it\u2019s your institution\u2019s most valuable asset.<\/h2>\n\n\n\n<p class=\"is-style-large\">Unfortunately, cyberattacks are on the rise, and colleges and universities are attractive targets, especially as the attack surface has expanded with hybrid learning.&nbsp; How can university IT and security ensure data security?&nbsp;<\/p>\n\n\n\n<p class=\"is-style-large\">This webinar will provide higher education IT professionals and data security personnel with the information they need to ensure the security of their institution\u2019s data and intellectual property. Our expert panel will discuss the importance of data security, compliance requirements and best practices, cyber threats and how to protect against them, and more. Participants will learn how to build and maintain an effective security strategy for their institution, as well as how to handle a data breach should one occur.<\/p>\n\n\n\n<p class=\"is-style-large\">Join Commvault and Microsoft in this session to learn:<\/p>\n\n\n\n<ul class=\"is-style-numbered-large wp-block-list\">\n<li class=\"downloadnow\">The importance of data security within higher education institutions&nbsp;<\/li>\n\n\n\n<li class=\"\">How to satisfy compliance requirements&nbsp;<\/li>\n\n\n\n<li class=\"\">Best practices for data protection<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column mt-md is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<script>\n\twindow.Commvault = window.Commvault || {};\n\tif ( ! window.Commvault.marketo ) {\n\t\twindow.Commvault.marketo = {\n\t\t\tforms: [],\n\t\t\tbaseUrl: '\/\/discover.commvault.com',\n\t\t\trecaptchaKey: '',\n\t\t};\n\t}\n\twindow.Commvault.marketo.forms.push( {\n\t\tformId: 8235,\n\t\tmunchkinId: '097-UGL-749',\n\t\tredirectUrl: 'https:\/\/www.commvault.com\/gc\/thank-you\/best-practices-for-protecting-your-data',\n\t\tblockPersonalEmail: false,\n\t\tdriftFastlane: false,\n\t\tdriftFastlaneCampaignId:undefined,\n\t\tdriftFastlaneMobileRedirectUrl: '',\n\t\tdataLayer: {\n\t\t\tformName: '',\n\t\t\tgoalType: ''\n\t\t}\n\t} );\n<\/script>\n\n<div class=\"marketo-form marketo-form--\">\n\t<form id=\"mktoForm_8235\" class=\"mktoForm mktoFormId_8235 track-event-form\" data-goaltype=\"\" data-formname=\"\" form=\"\">\n\t<\/form>\n<\/div>\n\n<script src=\"\/\/discover.commvault.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<script>\n\tMktoForms2.loadForm(\"\/\/discover.commvault.com\", \"097-UGL-749\", 8235, function( form ){\n\t\tvar nameOfTheForm = document.querySelector( '.mktoFormId_8235' ).getAttribute( 'data-formname' );\n\t\tvar goaltypeOfTheForm = document.querySelector( '.mktoFormId_8235' ).getAttribute( 'data-goaltype' );\n\n\t\tform.getFormElem()\n\t\t.find('button.mktoButton')\n\t\t.html('Watch now');\n\n\t\tform.onSuccess( function( values, followUpUrl ) {\n\t\t\tvar fieldValues = form.getValues();\n\t\t\tvar qparams = '';\n\t\t\tdataLayer.push({\n\t\t\t\tevent: 'gtm.submit',\n\t\t\t\tgtm:{\n\t\t\t\t\telement:{\n\t\t\t\t\t\tdataset:{\n\t\t\t\t\t\t\tgoaltype:goaltypeOfTheForm,\n\t\t\t\t\t\t\tformname: nameOfTheForm\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t} );\n\t\t\t\t\t\t\tlocation.href = \"https:\/\/www.commvault.com\/gc\/thank-you\/best-practices-for-protecting-your-data\";\n\t\t\t\treturn false;\n\t\t\t\t\t} );\n\t} );\n<\/script>\n\n<!--clearbit script-->\n<script type=\"text\/javascript\">\n\tvar pollForDefinition = function (scope, varname, callback) {\n\t\tif (typeof scope[varname] !== \"undefined\") {\n\t\t\treturn callback();\n\t\t}\n\t\tvar interval = setInterval(function () {\n\t\t\tif (typeof scope[varname] !== \"undefined\") {\n\t\t\t\tclearInterval(interval);\n\t\t\t\tcallback();\n\t\t\t}\n\t\t}, 250);\n\t};\n\tvar script = document.createElement(\"script\");\n\tscript.src = \" https:\/\/marketo.clearbit.com\/assets\/v1\/marketo\/forms.js\";\n\tscript.async = true;\n\tscript.setAttribute(\"data-clearbit-publishable-key\", \"pk_80bd48dbad484efde7bc5fde7c48c59f\");\n\tscript.onerror = function (e) {\n\t\tconsole.log(\"Clearbit Form JS unable to load\");\n\t\tpollForDefinition(window, \"MktoForms2\", function () {\n\t\t\tMktoForms2.whenReady(function (form) {\n\t\t\t\tform.setValues({clearbitFormStatus: \"Clearbit Form JS unable to load\"});\n\t\t\t});\n\t\t});\n\t};\n\tdocument.body.appendChild(script);\n\n<\/script>\n\t<\/div>\n<\/div>\n\n\n\n<p class=\"\"><\/p>\n\n\n\n<p class=\"\"><\/p>\n\n\n\n<p class=\"\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Data is everywhere, and it\u2019s your institution\u2019s most valuable asset. Unfortunately, cyberattacks are on the rise, and colleges and universities are attractive targets, especially as the attack surface has expanded with hybrid learning.&nbsp; How can university IT and security ensure data security?&nbsp; This webinar will provide higher education IT professionals and data security personnel with [&hellip;]<\/p>\n","protected":false},"author":85,"featured_media":494367,"parent":79331,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_custom_css":"","_custom_js_footer":"","_page_background_color":"","_remove_from_search":false,"_dark_mode":false,"_light_footer_mode":false,"_sidebar_form":{"id":"","name":"","cta":"","redirect":""},"_alert_notification_bar":{"show":true,"bg_color":"","content":"","call_to_action_label":"","call_to_action_link":""},"_footer_cta":{"show":false,"title":"","subtitle":"","cta_text":"","cta_link":"","background":{"id":0,"url":""}},"_cmv_customer_logo":{"id":0,"url":""},"_badge_descriptions":"","_featured_resource":"","_featured_resource_type":"","_custom_title":"","_featured_case_study":"","_footer_case_study":"","_upcoming_webinars_title":"","_upcoming_techdemos_title":"","_template_config":"","_lead_capture_hide_menu":false,"_lead_capture_cta_text":"","_lead_capture_cta_link":"","i18n_hreflangs":"","footnotes":""},"cmv_group":[],"cmv_structure_scheme":[],"class_list":{"0":"post-504542","1":"page","2":"type-page","3":"status-publish","4":"has-post-thumbnail","6":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.0 (Yoast SEO v23.0) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Best Practices for Protecting your Data | Commvault<\/title>\n<meta name=\"description\" content=\"Watch this webinar to gain more insight into Commvault, as well as useful strategies to defend against cyberattacks and their increasing frequency.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.commvault.com\/gc\/best-practices-for-protecting-your-data\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Best Practices for Protecting your Data\" \/>\n<meta property=\"og:description\" content=\"Watch this webinar to gain more insight into Commvault, as well as useful strategies to defend against cyberattacks and their increasing frequency.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.commvault.com\/gc\/best-practices-for-protecting-your-data\" \/>\n<meta property=\"og:site_name\" content=\"Commvault - English - United States\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Commvault\/\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-15T13:40:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2023\/11\/MicrosoftTeams-image-45.jpg?quality=80\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@commvault\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Best Practices for Protecting your Data | Commvault","description":"Watch this webinar to gain more insight into Commvault, as well as useful strategies to defend against cyberattacks and their increasing frequency.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.commvault.com\/gc\/best-practices-for-protecting-your-data","og_locale":"en_US","og_type":"article","og_title":"Best Practices for Protecting your Data","og_description":"Watch this webinar to gain more insight into Commvault, as well as useful strategies to defend against cyberattacks and their increasing frequency.","og_url":"https:\/\/www.commvault.com\/gc\/best-practices-for-protecting-your-data","og_site_name":"Commvault - English - United States","article_publisher":"https:\/\/www.facebook.com\/Commvault\/","article_modified_time":"2023-12-15T13:40:38+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2023\/11\/MicrosoftTeams-image-45.jpg?quality=80","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@commvault","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.commvault.com\/gc\/best-practices-for-protecting-your-data","url":"https:\/\/www.commvault.com\/gc\/best-practices-for-protecting-your-data","name":"Best Practices for Protecting your Data | Commvault","isPartOf":{"@id":"https:\/\/commvault-new.go-vip.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.commvault.com\/gc\/best-practices-for-protecting-your-data#primaryimage"},"image":{"@id":"https:\/\/www.commvault.com\/gc\/best-practices-for-protecting-your-data#primaryimage"},"thumbnailUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2023\/11\/MicrosoftTeams-image-45.jpg?quality=80","datePublished":"2023-12-15T13:32:26+00:00","dateModified":"2023-12-15T13:40:38+00:00","description":"Watch this webinar to gain more insight into Commvault, as well as useful strategies to defend against cyberattacks and their increasing frequency.","breadcrumb":{"@id":"https:\/\/www.commvault.com\/gc\/best-practices-for-protecting-your-data#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.commvault.com\/gc\/best-practices-for-protecting-your-data"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.commvault.com\/gc\/best-practices-for-protecting-your-data#primaryimage","url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2023\/11\/MicrosoftTeams-image-45.jpg?quality=80","contentUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2023\/11\/MicrosoftTeams-image-45.jpg?quality=80","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.commvault.com\/gc\/best-practices-for-protecting-your-data#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.commvault.com\/"},{"@type":"ListItem","position":2,"name":"Gated Content","item":"https:\/\/www.commvault.com\/gc"},{"@type":"ListItem","position":3,"name":"Best Practices for Protecting your Data"}]},{"@type":"WebSite","@id":"https:\/\/commvault-new.go-vip.net\/#website","url":"https:\/\/commvault-new.go-vip.net\/","name":"Commvault - English - United States","description":"","publisher":{"@id":"https:\/\/commvault-new.go-vip.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/commvault-new.go-vip.net\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/commvault-new.go-vip.net\/#organization","name":"Commvault","url":"https:\/\/commvault-new.go-vip.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/","url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","contentUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","width":1200,"height":628,"caption":"Commvault"},"image":{"@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Commvault\/","https:\/\/x.com\/commvault","https:\/\/www.instagram.com\/commvault\/","https:\/\/www.linkedin.com\/company\/commvault","https:\/\/www.youtube.com\/user\/commvault","https:\/\/en.wikipedia.org\/wiki\/Commvault"]}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/pages\/504542","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/users\/85"}],"replies":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/comments?post=504542"}],"version-history":[{"count":7,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/pages\/504542\/revisions"}],"predecessor-version":[{"id":515487,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/pages\/504542\/revisions\/515487"}],"up":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/pages\/79331"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/media\/494367"}],"wp:attachment":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/media?parent=504542"}],"wp:term":[{"taxonomy":"cmv_group","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/cmv_group?post=504542"},{"taxonomy":"cmv_structure_scheme","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/cmv_structure_scheme?post=504542"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}