Spanning Blog

Welcome to our blog featuring thought leadership and best practices on SaaS backup and recovery, data protection and security, and regular product updates for Spanning Backup for Office 365, Google Workspace, and Salesforce.

SQL Injection Attacks (SQLi) — Web-based Application Security, Part 4

SQL Injection attacks are accomplished via insertion of untrusted input in a valid command or query of a vulnerable SQL-driven website or database, which then maliciously alters the execution of that program. SQL Injection attacks are simple to execute, but potent enough to cause serious damage.


READ MORE >


6-Point Office 365 Post-Migration Checklist

Plan for your post-migration with the same enthusiasm as your Office 365 migration planning. Significantly offset the post-migration chaos by adhering to this six-point post-migration checklist.


READ MORE >


5 Guidelines for a Successful Office 365 Migration

When moving to the cloud, security and compliance are among the top concerns for many organizations. Following these 5 guidelines will help to ensure a smooth transition to Office 365 and establish a means for successful operation from the get-go.


READ MORE >


Invisible aka Fileless Malware — Malware of the Month, June 2019

Invisible malware is a type of Fileless malware that comes with zero footprint and is responsible for an increasing number of endpoint or zero-day attacks. It typically resides in memory, comes packaged as firmware or lives in your Basic Input/Output System (BIOS) – thus bypassing anti-virus software. It truly is invisible.


READ MORE >


Cross-Site Scripting (XSS) — Web-based Application Security, Part 3

Cross-site scripting (XSS) is a technique in which malicious scripts are stored on and unknowingly retrieved from trusted websites by unsuspecting victims. Learn how to safeguard against this threat to your sensitive data.


READ MORE >


The Year of GDPR

The EU General Data Protection Regulation (GDPR) came into effect on May 25, 2018. With nearly a year under its belt, Spanning takes a look at the major penalties & overall repercussions of GDPR and examines what we can learn from them.


READ MORE >


The Why, What and How of Migrating from Google Workspace to Office 365

If your organization is contemplating a migration from Google Workspace to Office 365, it’s best to first consider three questions: Why migrate?… What is the current data landscape?… and how should you proceed with the migration? Answering these questions and understanding how Spanning can help will make your migration seamless and pain free.


READ MORE >


Cross-Site Forgery — Web-based Application Security, Part 2

Cross-site forgery (CSRF) is a malicious technique designed to take advantage of unsuspecting users who are actively logged into web applications. Learn more about this threat to your data and how to safeguard against it.


READ MORE >


Unvalidated Redirects — Web-based Application Security, Part 1

Understanding open redirection vulnerabilities is key to detecting them and protecting your organization’s data. Without proper validation, attackers can redirect victims from trusted to malicious sites, or use forwards to access unauthorized pages.


READ MORE >


Gmail Recovery Made Easy: Get Lost Gmail Back in Just a Few Clicks

As a Google Workspace admin, you’re likely familiar with panic-struck end users asking you to restore Gmail messages that are lost. Here are some common Gmail data loss scenarios, with steps to use Spanning Backup to restore email messages in a couple of clicks. Restoring Lost Email Consider two examples for end user Gmail data [...]

READ MORE >