Spanning Blog

Welcome to our blog featuring thought leadership and best practices on SaaS backup and recovery, data protection and security, and regular product updates for Spanning Backup for Office 365, G Suite, and Salesforce.

Hurricane Season is Upon Us: Is Your Business Continuity and Disaster Recovery Plan Ready?

As the southeastern United States braces for another hurricane season on the heels of the busy 2018 season, it’s a good reminder for all organizations, no matter where they are headquartered, to review their business continuity and disaster recovery plans. We’ve gathered the following four tips to get you on track — and to help you be better prepared in the future.


READ MORE >


Cross-Site Scripting (XSS) — Web-based Application Security, Part 3

Cross-site scripting (XSS) is a technique in which malicious scripts are stored on and unknowingly retrieved from trusted websites by unsuspecting victims. Learn how to safeguard against this threat to your sensitive data.


READ MORE >


Emotet: The Banking Trojan — Malware of the Month, May 2019

Emotet — a banking trojan malware program that the Center for Internet Security (CIS) calls one of the “most costly and destructive malware” — is Spanning’s first spotlight in a new series titled “Malware of the Month.” Every month, Spanning will take a closer look at a new or existing malware that is making recent headlines. Emotet gets the honor for May 2019.


READ MORE >


The Year of GDPR

The EU General Data Protection Regulation (GDPR) came into effect on May 25, 2018. With nearly a year under its belt, Spanning takes a look at the major penalties & overall repercussions of GDPR and examines what we can learn from them.


READ MORE >


The Why, What and How of Migrating from G Suite to Office 365

If your organization is contemplating a migration from G Suite to Office 365, it’s best to first consider three questions: Why migrate?… What is the current data landscape?… and how should you proceed with the migration? Answering these questions and understanding how Spanning can help will make your migration seamless and pain free.


READ MORE >


Cross-Site Forgery — Web-based Application Security, Part 2

Cross-site forgery (CSRF) is a malicious technique designed to take advantage of unsuspecting users who are actively logged into web applications. Learn more about this threat to your data and how to safeguard against it.


READ MORE >


Open Redirection Vulnerability — Web-based Application Security, Part 1

Understanding open redirection vulnerabilities is key to detecting them and protecting your organization’s data. Without proper validation, attackers can redirect victims from trusted to malicious sites, or use forwards to access unauthorized pages.


READ MORE >


Gmail Recovery Made Easy: Get Lost Gmail Back in Just a Few Clicks

As a G Suite admin, you’re likely familiar with panic-struck end users asking you to restore Gmail messages that are lost. Here are some common Gmail data loss scenarios, with steps to use Spanning Backup to restore email messages in a couple of clicks. Restoring Lost Email Consider two examples for end user Gmail data [...]

READ MORE >


2019 SaaS Trends: If the Climate’s Sunny, Why’s the Forecast Mixed?

The adoption of SaaS applications is projected to grow at double-digit rates through 2019, according to Bain & Co.; projections for SaaS growth per Gartner are similar. In 2019, those organizations wanting the benefits of SaaS applications will find themselves in good company. The climate for adopting SaaS is sunny, trending up and to the right. But a trend in the climate isn’t the same as a trend in the weather — and MSPs and IT managers at mid-market organizations need to be aware of this distinction as they plan for (more) SaaS adoption in 2019.


READ MORE >


Business Continuity and Disaster Recovery: Your Organization’s Safety Plan

From hurricanes, errant employees, malware to even a rodent with an appetite for cables — the likelihood of an organization suffering data loss has never been greater. An organization’s best defense is to plan for business continuity and disaster recovery by using processes that guide organizations to possibly prevent and/or better manage an (unpredictable) disruptive event.


READ MORE >