Spanning Blog

Welcome to our blog featuring thought leadership and best practices on SaaS backup and recovery, data protection and security, DevOps, and regular product updates for Spanning Backup for Office 365, G Suite, and Salesforce.

Gmail Recovery Made Easy: Get Lost Gmail Back in Just a Few Clicks

As an IT professional, you’re all too familiar with users coming to you to try and recover data that’s been lost. It happens. Here are some reasons why users might lose email in Gmail, and some videos that will show you an easy way to get them back.


READ MORE >


3 Options for Restoring Lost Data in Google Apps

With Google’s recently announced Data Loss Prevention feature, you may think your Google Apps domain is safe enough, but you’d be wrong. Their Data Loss prevention will protect Google Apps Unlimited customers in rule-based ways, but can do nothing to protect customers from sync errors, or errors where admins or users accidentally delete critical email.


READ MORE >


[Videos] How To Backup and Recover Salesforce Data

It’s only 67 days until Dreamforce ‘17, but Salesforce Admins and Developers don’t need to wait to protect their critical business data and metadata in Salesforce. In this blog, you’ll discover “how to” videos that will show you a better way to restore lost data in use cases like these. Recovering faster from a Salesforce […]


READ MORE >


Four Key Facts about Office 365 and Sharepoint Backup

If you’re reading this, you’ve likely adopted or are thinking about migrating to Office 365 and SharePoint Online. As organizations across the globe migrate their Exchange, OneDrive and SharePoint workloads to the cloud, they’re discovering that they need to review and adapt IT processes to better align with changes in functionality, both positive and negative. […]


READ MORE >


Build a Security Go Bag in the Near and Long Term

Cybersecurity and ransomware are dominating the news. And while IT teams and security officers are consumed by this news, executive, compliance and legal teams are also paying attention due to the business-wide repercussions of an attack, from productivity and revenue losses to business process failures. You probably can’t help but wonder if you are prepared. […]


READ MORE >


The Global Impact of GDPR

The EU General Data Protection Regulation (GDPR) is fast-approaching with less than a year remaining for data controllers and processors to comply.  Non-compliance could result in legal action or large fines (up to 4 percent of an organization’s global turnover or €20 Million). As the deadline looms, companies around the globe who interact in any […]


READ MORE >


Stop Wrestling with the Salesforce Export

Save Hours Each Week While Protecting Salesforce Data. Experienced Salesforce admins and developers, like those attending #SalesforceTour Chicago, know the value of their Salesforce data and metadata for managing and meeting organizational goals. But even experienced Salesforce professionals can be unaware of the causes, and real risks, of data loss—much less how to recover quickly. […]


READ MORE >


Can You Count on Your Data Protection Vendor to be Resilient?

Failures happen. Whether it’s a flat tire, a ransomware attack, or a service outage of a SaaS application that you rely on, it isn’t a question of if but when. To be fully prepared for a SaaS data loss event you need to have a strong recovery plan and you need to test it to […]


READ MORE >


Protect Your Organization Against Ransomware Attacks in Three Easy Steps

It happened. Over  the last few years, security experts and technologists alike have been talking about the potential impact of a global ransomware attack, and on a Friday morning, starting in the UK and rippling across Europe and Asia Pacific, more than 200,000 computers in 150 countries were compromised. As organizations assess the overall impact, […]


READ MORE >


What Yesterday’s Gmail Attack Taught Us

Data Protection is a shared responsibility. The Internet was all abuzz yesterday when a sophisticated Gmail phishing attack hit.  The rogue email, often appearing to be sent from one of your contacts, masqueraded as a Google Docs sharing request, but in actuality was a link that requests the user to grant access to an application […]


READ MORE >