Spanning Blog

Welcome to our blog featuring thought leadership and best practices on SaaS backup and recovery, data protection and security, and regular product updates for Spanning Backup for Office 365, Google Workspace, and Salesforce.

How Phishing Attacks Ruin Microsoft 365 and Google Workspace

Cyberthreats adversely impact your SaaS applications and data. Here’s a look at how phishing affects your Microsoft 365 and Google Workspace environment.


READ MORE >


Tech Trends and Insights 2022 Survey: Tech Trends Impacting SMBs and MMEs in 2022

Tech Trends and Insights 2022 Survey Report highlights technology-related priorities and concerns of worldwide IT professionals in response to hybrid work.


READ MORE >


BCDR: Why Business Continuity and Disaster Recovery Is Essential

Business continuity and disaster recovery (BCDR) processes are essential for organizations to avoid downtime in the wake of an interruption. Learn more.


READ MORE >


Data ASaaSsins: Threats That Can Cause Data Loss and Hurt Your Business

Read this blog to learn about the various threats and the threat actors that cause SaaS data loss and be detrimental to your organization or business.


READ MORE >


Ransomware Recovery: How to Respond to Ransomware Attacks

Ransomware recovery is the process of restoring critical systems and resuming business functions to an operational state after an attack. Learn more.


READ MORE >


“Dude, Where’s My Data?” — How Data Is Lost in the Cloud

Data loss in the cloud can occur due to human mistakes, programmatic errors, insider activities or cyberattacks. Find out how to better protect your SaaS data.


READ MORE >


Data Protection Solutions: Safeguard Your Data From Cyberattacks & Other Threats

“Data really powers everything that we do.” — Jeff Weiner, executive chairman of LinkedIn It is often said that data is the new oil, which means data is the most valuable resource in the world currently. Irrespective of what data scientists and experts might say, in today’s data-driven business environment, information is one of the [...]

READ MORE >


Backup Encryption: What It Is and Why It’s Important for Data Security

Backup encryption is the process of converting backups from plaintext to ciphertext using mathematical algorithms and encryption keys for maximum data security.


READ MORE >


Social Engineering: Definition, Examples, Types of Attacks and How to Prevent Them

More than 90% of cyberattacks rely on some form of social engineering. Learn about social engineering attacks, what to look for, and how to prevent them.


READ MORE >


Cybersecurity Awareness: Definition, Importance, Purpose and Challenges

Cybersecurity awareness is an ongoing process of educating employees about the threats that lurk in cyberspace and how to act responsibly. Learn more.


READ MORE >