Spanning Blog

Welcome to our blog featuring thought leadership and best practices on SaaS backup and recovery, data protection and security, and regular product updates for Spanning Backup for Office 365, Google Workspace, and Salesforce.

What Is Multifactor Authentication (MFA)? How It Works, Examples & Benefits

Multifactor authentication (MFA) requires users to provide multiple types of verification to access digital accounts, systems and apps. Learn how it works.


READ MORE >


Why You Need to Worry About the Dark Web and What You Can Do

The dark web is a hotbed for cybercrime. Learn about dark web service offerings, stolen data for purchase, and how to protect your business from falling victim.


READ MORE >


Cyberattacks 2022: Phishing, Ransomware & Data Breach Statistics

Cyberattacks had yet another record-breaking year in 2022. Here’s some statistics and trends on phishing, ransomware, and data breaches to be aware of.


READ MORE >


How Phishing Attacks Ruin Microsoft 365 and Google Workspace

Cyberthreats adversely impact your SaaS applications and data. Here’s a look at how phishing affects your Microsoft 365 and Google Workspace environment.


READ MORE >


Ransomware Recovery: How to Respond to Ransomware Attacks

Ransomware recovery is the process of restoring critical systems and resuming business functions to an operational state after an attack. Learn more.


READ MORE >


Cyberattacks 2021: Phishing, Ransomware & Data Breach Statistics From the Last Year

A close look at cyberattack statistics in 2021 and how to better protect your business against phishing, ransomware & data breaches moving forward.


READ MORE >


Types of Cyber Attacks: A Closer Look at Common Threats

By understanding the different types of cyber attacks and how they are executed, you can identify potential threats and take the required steps to prevent them if a cybersecurity event occurs.


READ MORE >


NanoCore RAT — Malware of the Month, May 2020

NanoCore — Spanning’s Malware of the Month for May 2020 — is an incredibly sophisticated Remote Access Trojan (RAT) that gives hackers free rein over an infected device.


READ MORE >


Prepare or Repair: Pointers for Both Sides of a Ransomware Attack

Ransomware attacks are increasing, getting more sophisticated and sparing no industry. In this blog we examine both sides of a ransomware attack — ways to prepare a solid defense (or offense) to prevent an attack and pointers to repair the damage if you do suffer an attack.


READ MORE >


What You Need to Know about Ransomware Attacks and Office 365

Over the past few years, there has been a stunning increase in the number and sophistication of ransomware attacks. Microsoft products and services have been targeted by cybercriminals for decades — now that Office 365 is the company’s fastest-growing solution, it’s a primary target. Given the great risks for losses at the hands of cybercriminals, every member of your organization — from your COO to each individual employee — must take proactive measures to protect the organization’s data.


READ MORE >