Spanning Blog

Welcome to our blog featuring thought leadership and best practices on SaaS backup and recovery, data protection and security, and regular product updates for Spanning Backup for Office 365, G Suite, and Salesforce.

Ransomware: Five Critical Steps Service Providers Must Take for Their Customers

Joe Noonan, VP of Products for Unitrends and Spanning, details why a strong prevention plan that includes good backups and the discipline to manage the backups correctly is the best way to beat ransomware.


READ MORE >


2019 Cloud and Disaster Recovery Survey: 3 Key Takeaways

Since 2015, Unitrends, a leading all-in-one enterprise backup solution provider, has conducted their annual Cloud and Disaster Recovery Survey to gauge the state of data backup across a wide range of organizations. Here are some of the major takeaways from this year’s survey report, Growing Usage of SaaS Data Protection – Unitrends 2019 Survey.


READ MORE >


TrickBot – Malware of the Month, August 2019

TrickBot, at its root, is a form of Trojan malware. Like its namesake, malware of this type cleverly disguises its true intent. What’s even more dangerous is that TrickBot is constantly evolving with increasingly potent attacks. Learn more about our Malware of the Month for August, 2019, and what you can do to stay prepared.


READ MORE >


Migrating from Office 365 to G Suite: Tips to Remember

Migrating from one platform to another, particularly one that forms the bedrock of an organization, can be extremely stressful and sub-optimal if not carefully charted. Here are some pointers to lay the groundwork for one such transformational change: migrating from Office 365 to G Suite.


READ MORE >


CIA Triad: Best Practices for Securing Your Org

The CIA Triad, or Confidentiality-Integrity-Availability, is a flexible model that can be applied to help secure your organization’s information systems, applications, and network. Learn about the three pillars of the framework and how you can implement them into your org’s information security protocol.


READ MORE >


Forming a Backup Strategy: 4 Steps to Follow

A comprehensive backup strategy is an essential part of an organization’s cyber safety net and it’s important to have one outlined & put in place before a data loss event occurs. Follow these four steps to help you form a strategy that is right for your organization.


READ MORE >


Happy 20th Annual SysAdmin Day From Spanning

Today is SysAdmin Day, a day created for SysAdmins by SysAdmins, because no one ever gives you enough credit for the work you do. If you’re good at your job, people rarely notice because it means everything is running smoothly. Not today though… today, we salute you.


READ MORE >


Stegware aka Steganography Malware – Malware of the Month, July 2019

Stegware, or Steganography Malware, is accomplished by concealing a file, message, image, or video within another of the same type for malicious purposes. Stegware’s relatively easy implementation and difficulty to detect have put it on the rise lately.


READ MORE >


SQL Injection Attacks (SQLi) — Web-based Application Security, Part 4

SQL Injection attacks are accomplished via insertion of untrusted input in a valid command or query of a vulnerable SQL-driven website or database, which then maliciously alters the execution of that program. SQL Injection attacks are simple to execute, but potent enough to cause serious damage.


READ MORE >


6-Point Office 365 Post-Migration Checklist

Plan for your post-migration with the same enthusiasm as your Office 365 migration planning. Significantly offset the post-migration chaos by adhering to this six-point post-migration checklist.


READ MORE >