Spanning Blog

Welcome to our blog featuring thought leadership and best practices on SaaS backup and recovery, data protection and security, and regular product updates for Spanning Backup for Office 365, G Suite, and Salesforce.

Cloud Computing: Benefits, Disadvantages & Types of Cloud Computing Services

Cloud computing is the delivery of computing resources over the internet. Learn about its benefits and how to better protect your SaaS data.


READ MORE >


Types of Malware: How to Detect and Prevent Them

Malware attacks are costly and destructive. Learn about the different types of malware, how they work and how to protect your data from these threats.


READ MORE >


Microsoft 365 Data Loss Prevention (DLP): Capabilities, Limitations & Solution

Microsoft 365 DLP helps protect sensitive data in use, in motion, and at rest. However, it has limitations. Discover how to better protect your data.


READ MORE >


Microsoft 365 Security: Features, Best Practices, and the Need for SaaS Backup

Take a deep dive on Microsoft 365 security features, best practices, and the remaining need for SaaS backup to ensure ultimate data protection.


READ MORE >


Data Loss Prevention: What Is DLP and Why Is It Important?

Data loss prevention (DLP) combines technologies, strategies and processes to protect your data from loss and unauthorized access. Learn more.


READ MORE >


Data Protection Officer (DPO): Why Your Business Needs One

A data protection officer (DPO) ensures that a company’s processing of individuals’ personal data is done in a GDPR-compliant manner. Learn more.


READ MORE >


Cyber Resilience and Its Importance for Your Business

Cyber resilience helps businesses better defend against cyber crimes, mitigate risks and severity of attacks, and enables business continuity. Learn more.


READ MORE >


5 Microsoft Teams Security Best Practices for Better Collaboration

Learn the top five Microsoft Teams security best practices to keep sensitive information secure while allowing users to collaborate seamlessly.


READ MORE >


File Inclusion Vulnerabilities — Web-based Application Security, Part 9

PHP File Inclusion represents a security flaw in web applications that can result in information disclosure. Learn more about LFI and RFI vulnerabilities.


READ MORE >


7 Types of Phishing: How to Recognize Them & Stay Off the Hook

Phishing is today’s most dangerous cyberattack. Google noted a more than 600% spike in phishing attacks in 2020 compared to 2019 with a total of 2,145,013 phishing sites registered as of January 17, 2021, up from 1,690,000 on Jan 19, 2020. It is the gateway to many types of damaging cyberattack including ransomware, malware, business [...]

READ MORE >