Spanning Blog

Welcome to our blog featuring thought leadership and best practices on SaaS backup and recovery, data protection and security, DevOps, and regular product updates for Spanning Backup for Office 365, G Suite, and Salesforce.

Countdown to GDPR #3: Do You Need a Data Protection Officer?

To prepare for the upcoming GDPR we’re doing a series of blogs about key regulations and ways to be compliant with them. In Part 1 we discussed the Right to Be Forgotten and in Part 2 we spoke about Privacy by Design and by Default. In this blog we analyze the emerging role of the […]


READ MORE >


HIPAA: Check your Backup and Restore Solution

Despite the huge damage of a data breach in terms of cost, reputation, and business losses, backup and recovery systems are currently in use at only 45% of surveyed healthcare organizations, and more than 38% are not planning to use backup and recovery systems at all. Why put yourself and your organization under the looming […]


READ MORE >


Countdown to GDPR #2: Privacy by Design and by Default

The deadline for compliance with GDPR is closing in and many of us are grappling with its regulations and their impact. In this blog series, we’re unpacking GDPR’s key provisions and exploring the implications for your compliance and technology teams. We started the series with Countdown to GDPR: The Right to Be Forgotten where we […]


READ MORE >


Pointers for HIPAA Compliance in the Cloud

SaaS applications like G Suite, Office 365, and Salesforce are revolutionizing the healthcare industry with improvements to agility, connectivity, and accessibility. On the flip side, Public Health Information (PHI) breaches are also on the rise and proper data protection remains a top concern. That is because PHI data is incredibly valuable on the black market; […]


READ MORE >


Countdown to GDPR #1: The Right to Be Forgotten

The EU General Data Protection Regulation (GDPR) deadline is looming, and no one’s entirely sure about its implications and compliance requirements. What we do know is that with GDPR the onus of compliance lies with both the data controller (primary data holders/managers/subscribers) and the Data processors (secondary data holders, SaaS/vendor apps). Or as Google put […]


READ MORE >


Security Awareness Training: Trick or Treat Your Employees?

Real-life cybersecurity horror stories abound. The Equifax breach threatens most of our identities. The KRACK vulnerability makes the Wi-Fi networks we live on unsafe. Our vulnerable electronic voting systems threaten our democracy. Breach fatigue is real, not only among consumers, but businesses as well. In fact, most expect breaches to be inevitable. According to a […]


READ MORE >


GDPR Advice for SaaS Companies

In an effort to expand the privacy rights of EU individuals, the EU General Data Protection Regulation (GDPR) places new obligations on any organization, no matter where it is based, that markets to, tracks or handles EU personal data. As you can imagine, the GDPR is the compliance talk-of-the-town for any company doing business in […]


READ MORE >


The Global Impact of GDPR

The EU General Data Protection Regulation (GDPR) is fast-approaching with less than a year remaining for data controllers and processors to comply.  Non-compliance could result in legal action or large fines (up to 4 percent of an organization’s global turnover or €20 Million). As the deadline looms, companies around the globe who interact in any […]


READ MORE >


Data Sovereignty and the Cloud: Are You Compliant?

The rapid adoption and popularity of cloud and SaaS applications such as Microsoft Office 365 and Salesforce have introduced a better way to collaborate and share data, and have provided businesses with improvements in efficiency and lowered IT costs. SaaS and cloud computing are changing the paradigm for how we work. As you move to […]


READ MORE >


Best Practices for Lowering Cyber Insurance Costs and Cyber Risk

If your cyber insurance vendor offers discounts for companies who meet high data security and protection standards, they will likely focus on these processes and controls. With cybersecurity threats on the rise, companies are increasingly taking advantage of cybersecurity insurance. And while cyber insurance can be worth it, it’ll cost you. Last year, U.S. insurers […]


READ MORE >