

Posts by Greg Jehs
Greg Jehs is the Vice President of the mProtect Center of Excellence. mProtect is a managed service offering focusing on the protection, migration, and management of data in on-premises, public, private, or hybrid cloud environments. The CoE is focused on helping clients lower their costs while increasing their business-outcome-focused adoption of information technology. Greg has over 20 years of dedicated IT experience. Upon graduating from Barry University, he spent over 2 years as a Systems Architect at R&D Systems Group Inc. before moving to Meridian IT.

- Cyber Resiliency
- Managed Services
- mProtect
- Data Protection
- Data Backup
Securing Remote and Hybrid Work Environments: Best Practices for Protecting Your Business
As remote and hybrid work models continue to shape the modern workforc...
- mProtect
- Data Protection
- Data Backup
Commvault vs Veritas: Choosing the Right Data Protection and Backup Solution
Before diving into the comparison, let's briefly introduce Commvault a...
- Cyber Resiliency
- mProtect
Air Gap vs Immutable Backups: Understanding the Difference Between Air Gapping and Immutable Storage
In today's rapidly evolving digital landscape, protecting critical dat...
- Cyber Resiliency
- mProtect
Introduction to Zero Day Threats
In the dynamic world of cybersecurity, zero day threats stand out for ...
- mProtect
- Data Protection
- Data Backup
Data Loss: Causes, Consequences, & How to Prevent It
With the increasing volume and complexity of data being generated and ...
- Cyber Resiliency
- mProtect
- Data Protection
Cyber Resilience Series: A Deep-Dive into Clean Room Recovery
In today's chaotic, hybrid world, staying ahead of cyber threats is mo...
- Cyber Resiliency
- mProtect
- Data Protection
Cyber Resilience Series: The Power of Active Directory Backup
In today's digital age, businesses of all sizes rely heavily on sophis...
- Cyber Resiliency
- mProtect
Cyber Resilience Series: Microsoft 365 and Your Ransomware Protection Strategy
In the ever-evolving landscape of cybersecurity threats, ransomware ha...
SEARCH FOR TOPIC:
MUST READS:
-
Disaster Recovery Strategies for Enterprises in 2025Cyber ResiliencymProtectData ProtectionData Backup
-
Protecting Customer Privacy in an AI-Powered Contact CenterContact CenterCollaborationmCollab
-
Securing Remote and Hybrid Work Environments: Best Practices for Protecting Your BusinessCyber ResiliencyManaged ServicesmProtectData ProtectionData Backup
-
Preparing Your Contact Center for the AI-First EraContact CenterCollaborationmCollabContact Center AIAI