Spanning Blog

Welcome to our blog featuring thought leadership and best practices on SaaS backup and recovery, data protection and security, and regular product updates for Spanning Backup for Office 365, G Suite, and Salesforce.

Spanning Blog: The Best of 2020

The Spanning blog provides important insights into the world of enterprise data protection. Here’s a recap of the most popular blogs from 2020.


READ MORE >


SharePoint Online: Everything You Should Know

SharePoint Online is a powerful web-based application used for collaboration and information exchange across an organization. Learn all you need to know.


READ MORE >


Data Retention Policy: What It Is and How to Create One

A data retention policy guides what data should be stored or archived, where that should happen and for how long. Download a free data retention template to get started.


READ MORE >


Spanning Release Notes: Office 365 Backup MSP Edition

Spanning Office 365 Backup MSP Edition offers comprehensive protection against Office 365 data loss, ensuring seamless business continuity.


READ MORE >


Total Cost of Ownership: Why It’s Important for Businesses

A total cost of ownership (TCO) analysis is vital to examine the financial impact of implementing new technologies in business. In information technology, assessing the TCO provides a broader view of the investment and the value of the product over its lifespan.


READ MORE >


Google Drive Trash Retention Reduced by 10,000 Years

As of October 13, 2020, all files placed in Google Drive trash will be permanently deleted after 30 days. Previously, these files would be retained indefinitely unless manually deleted by the user. Learn what this means for G Suite users moving forward.


READ MORE >


Directory Traversal — Web-based Application Security, Part 8

Directory traversal is a web application security vulnerability that allows unauthorized users to access files from different folders or directories that they would otherwise be restricted from accessing.


READ MORE >


Mobile Malware: What Makes It Dangerous?

Cybercriminals are using mobile malware to get their hands on business data stored on your smartphone. Learn all about the types of mobile malware out there and what protection measures you can take to repel them.


READ MORE >


Types of Cyber Attacks: A Closer Look at Common Threats

By understanding the different types of cyber attacks and how they are executed, you can identify potential threats and take the required steps to prevent them if a cybersecurity event occurs.


READ MORE >


Google Backup and Sync: Is It Really Backup?

The Google Backup and Sync app (for personal use and Drive File Stream for businesses) is the replacement for Google Drive and Photos desktop apps for Windows PCs and Macs. Learn how to use it and if it’s really a viable “backup” option.


READ MORE >