Spanning Blog

Welcome to our blog featuring thought leadership and best practices on SaaS backup and recovery, data protection and security, and regular product updates for Spanning Backup for Office 365, G Suite, and Salesforce.

Spanning Release Notes: G Suite Backup with Integrated Dark Web Monitoring

Spanning Backup for G Suite with Dark Web Monitoring provides complete front-end and back-end G Suite protection – secure credentials – secure data.


READ MORE >


Denial-of-Service (DoS) Attacks — Web-based Application Security, Part 7

A Denial-of-Service (DoS) attack is when legitimate users are unable to access a network. Learn how they work and how to protect against them.


READ MORE >


Zero-Day Vulnerability: The Unknown Threats to Your Data

Zero-day vulnerabilities lead to zero-day exploits that put your data at risk. Learn how to keep your Office 365, G Suite and Salesforce data protected from such attacks.


READ MORE >


AES Encryption: A Closer Look at Advanced Encryption Standards

AES (Advanced Encryption Standard) is the gold standard when it comes to protecting your SaaS data. Take a deep dive into what makes AES the most secure encryption cipher out there.


READ MORE >


NanoCore RAT — Malware of the Month, May 2020

NanoCore — Spanning’s Malware of the Month for May 2020 — is an incredibly sophisticated Remote Access Trojan (RAT) that gives hackers free rein over an infected device.


READ MORE >


Pitching SaaS Backup: 3 Obstacles to Expect

Decision makers are often slow to recognize the value in a SaaS backup solution, even though the merits of Office 365 or G Suite backup are well known. Find out why and how to overcome the common obstacles faced.


READ MORE >


5 Tips for Successful Remote Workforce IT Management

To ensure your business makes it through these turbulent times relatively unscathed, here are five tips to help you manage your remote workforce.


READ MORE >


Spanning Release Notes: Office 365 Backup with Integrated Dark Web Monitoring

Keep your Office 365 credentials and data secured with the new Spanning Office 365 Backup feature — Dark Web monitoring.


READ MORE >


Intrusion Detection Systems: A Deep Dive Into NIDS & HIDS

Intrusion Detection Systems (IDS) are instrumental in guarding data from unauthorized access. Learn the main types of IDS and the role they play in data security.


READ MORE >


Insecure Direct Object Reference (IDOR) — Web-based Application Security, Part 6

Insecure Direct Object Reference (IDOR) vulnerabilities exist when direct object reference entities can be manipulated in order to gain access to otherwise private information. Learn how they work and how to protect against them.


READ MORE >