Jul 18
2019
SQL Injection attacks are accomplished via insertion of untrusted input in a valid command or query of a vulnerable SQL-driven website or database, which then maliciously alters the execution of that program. SQL Injection attacks are simple to execute, but potent enough to cause serious damage.
Jul 12
2019
Plan for your post-migration with the same enthusiasm as your Office 365 migration planning. Significantly offset the post-migration chaos by adhering to this six-point post-migration checklist.
Jun 28
2019
When moving to the cloud, security and compliance are among the top concerns for many organizations. Following these 5 guidelines will help to ensure a smooth transition to Office 365 and establish a means for successful operation from the get-go.
Jun 20
2019
Invisible malware is a type of Fileless malware that comes with zero footprint and is responsible for an increasing number of endpoint or zero-day attacks. It typically resides in memory, comes packaged as firmware or lives in your Basic Input/Output System (BIOS) – thus bypassing anti-virus software. It truly is invisible.
May 23
2019
Cross-site scripting (XSS) is a technique in which malicious scripts are stored on and unknowingly retrieved from trusted websites by unsuspecting victims. Learn how to safeguard against this threat to your sensitive data.
May 07
2019
The EU General Data Protection Regulation (GDPR) came into effect on May 25, 2018. With nearly a year under its belt, Spanning takes a look at the major penalties & overall repercussions of GDPR and examines what we can learn from them.
Apr 16
2019
If your organization is contemplating a migration from Google Workspace to Office 365, it’s best to first consider three questions: Why migrate?… What is the current data landscape?… and how should you proceed with the migration? Answering these questions and understanding how Spanning can help will make your migration seamless and pain free.
Apr 10
2019
Cross-site forgery (CSRF) is a malicious technique designed to take advantage of unsuspecting users who are actively logged into web applications. Learn more about this threat to your data and how to safeguard against it.
Mar 25
2019
Understanding open redirection vulnerabilities is key to detecting them and protecting your organization’s data. Without proper validation, attackers can redirect victims from trusted to malicious sites, or use forwards to access unauthorized pages.
Mar 12
2019