Spanning Blog

Welcome to our blog featuring thought leadership and best practices on SaaS backup and recovery, data protection and security, and regular product updates for Spanning Backup for Office 365, Google Workspace, and Salesforce.

Data ASaaSsins: Threats That Can Cause Data Loss and Hurt Your Business

Read this blog to learn about the various threats and the threat actors that cause SaaS data loss and be detrimental to your organization or business.


READ MORE >


Ransomware Recovery: How to Respond to Ransomware Attacks

Ransomware recovery is the process of restoring critical systems and resuming business functions to an operational state after an attack. Learn more.


READ MORE >


“Dude, Where’s My Data?” — How Data Is Lost in the Cloud

Data loss in the cloud can occur due to human mistakes, programmatic errors, insider activities or cyberattacks. Find out how to better protect your SaaS data.


READ MORE >


Salesforce Backup Best Practices

Data loss, corruption, duplication, deletion and overwrite are common in Salesforce. Learn more about best practices for Salesforce backup and data protection.


READ MORE >


Data Protection Solutions: Safeguard Your Data From Cyberattacks & Other Threats

“Data really powers everything that we do.” — Jeff Weiner, executive chairman of LinkedIn It is often said that data is the new oil, which means data is the most valuable resource in the world currently. Irrespective of what data scientists and experts might say, in today’s data-driven business environment, information is one of the [...]

READ MORE >


Backup Encryption: What It Is and Why It’s Important for Data Security

Backup encryption is the process of converting backups from plaintext to ciphertext using mathematical algorithms and encryption keys for maximum data security.


READ MORE >


Social Engineering: Definition, Examples, Types of Attacks and How to Prevent Them

More than 90% of cyberattacks rely on some form of social engineering. Learn about social engineering attacks, what to look for, and how to prevent them.


READ MORE >


Cybersecurity Awareness: Definition, Importance, Purpose and Challenges

Cybersecurity awareness is an ongoing process of educating employees about the threats that lurk in cyberspace and how to act responsibly. Learn more.


READ MORE >


Insider Threats: How to Protect Your Business and Data From the Enemy Within

Insider threats are security risks that originate from within an organization. Learn about different types, key indicators, and how to protect your data against them.


READ MORE >


Google Drive Backup: What Are Your Options?

Google Drive is a storage service that allows you to store files and folders online. Learn how to securely back up and protect your Google Drive data.


READ MORE >