Spanning Blog

Welcome to our blog featuring thought leadership and best practices on SaaS backup and recovery, data protection and security, and regular product updates for Spanning Backup for Office 365, G Suite, and Salesforce.

7 Types of Phishing: How to Recognize Them & Stay Off the Hook

Phishing is today’s most dangerous cyberattack. Google noted a more than 600% spike in phishing attacks in 2020 compared to 2019 with a total of 2,145,013 phishing sites registered as of January 17, 2021, up from 1,690,000 on Jan 19, 2020. It is the gateway to many types of damaging cyberattack including ransomware, malware, business [...]

READ MORE >


Phishing 101: How It Works & What to Look For

Phishing is one of today’s biggest cybersecurity threats and the premier gateway to an array of cybercrimes and fraud. Learn how to protect your organization.


READ MORE >


Your Guide to Exchange Online

Learn about the various Exchange Online offerings, how it fits into the Microsoft Office 365 plan, and how Spanning can help you protect it.


READ MORE >


Google Drive Trash: Deleting, Recovering and Everything in Between

Learn all about the Google Drive Trash folder and how Spanning acts as a safety net for items that might otherwise be lost forever.


READ MORE >


Data Retention Policy: What It Is and How to Create One

A data retention policy guides what data should be stored or archived, where that should happen and for how long. Download a free data retention template to get started.


READ MORE >


Total Cost of Ownership: Why It’s Important for Businesses

A total cost of ownership (TCO) analysis is vital to examine the financial impact of implementing new technologies in business. In information technology, assessing the TCO provides a broader view of the investment and the value of the product over its lifespan.


READ MORE >


Directory Traversal — Web-based Application Security, Part 8

Directory traversal is a web application security vulnerability that allows unauthorized users to access files from different folders or directories that they would otherwise be restricted from accessing.


READ MORE >


Mobile Malware: What Makes It Dangerous?

Cybercriminals are using mobile malware to get their hands on business data stored on your smartphone. Learn all about the types of mobile malware out there and what protection measures you can take to repel them.


READ MORE >


Types of Cyber Attacks: A Closer Look at Common Threats

By understanding the different types of cyber attacks and how they are executed, you can identify potential threats and take the required steps to prevent them if a cybersecurity event occurs.


READ MORE >


Protect Your Office 365 Data Against Consent Phishing

Protect your office 365 data from consent phishing. Use solutions like Spanning that are Azure Verified Publishers to ensure your data is protected.


READ MORE >