Spanning Blog

Welcome to our blog featuring thought leadership and best practices on SaaS backup and recovery, data protection and security, and regular product updates for Spanning Backup for Office 365, G Suite, and Salesforce.

5 Tips for Successful Remote Workforce IT Management

To ensure your business makes it through these turbulent times relatively unscathed, here are five tips to help you manage your remote workforce.


READ MORE >


Types of Backup: Understanding Full, Differential, and Incremental Backup

There are 3 main types of backup: full, differential, and incremental. The right type of backup leads to the right SaaS backup strategy. Learn what each has to offer.


READ MORE >


G Suite Sync for Microsoft Outlook: When Foes Become Friends

Want to use Outlook and G Suite at the same time? G Suite Sync for Microsoft Outlook (GSSMO) makes that possible. Learn about GSSMO set up, requirements, benefits, downsides and more.


READ MORE >


Spanning Release Notes: Office 365 Backup with Integrated Dark Web Monitoring

Keep your Office 365 credentials and data secured with the new Spanning Office 365 Backup feature — Dark Web monitoring.


READ MORE >


Risk Mitigation: How SaaS Backup Addresses Operational Risk

Looking for the best risk mitigation tactic to curb operational risks? Learn how a good backup solution can help, and how you can prove its business value to the leadership team using the Spanning Backup ROI Calculator.


READ MORE >


Intrusion Detection Systems: A Deep Dive Into NIDS & HIDS

Intrusion Detection Systems (IDS) are instrumental in guarding data from unauthorized access. Learn the main types of IDS and the role they play in data security.


READ MORE >


Insecure Direct Object Reference (IDOR) — Web-based Application Security, Part 6

Insecure Direct Object Reference (IDOR) vulnerabilities exist when direct object reference entities can be manipulated in order to gain access to otherwise private information. Learn how they work and how to protect against them.


READ MORE >


OAuth 2.0: What Is It and How Does It Work?

Learn what OAuth 2.0 protocol is, how open authorization works, and more importantly, why OAuth is vital for your backup vendors.


READ MORE >


CCPA: Salesforce Administrators Must Rethink Backup

Salesforce administrators under the CCPA need to rethink their backup and recovery strategies to ensure personal information is accurately backed up. 


READ MORE >


Ryuk Ransomware — Malware of the Month, January 2020

In the world of malware, Ryuk ransomware has gone from a rookie to a pro at a disturbing speed. Here we take a look at what Ryuk ransomware is, how it spreads, and how to protect your business from it.


READ MORE >