Spanning Blog

Welcome to our blog featuring thought leadership and best practices on SaaS backup and recovery, data protection and security, and regular product updates for Spanning Backup for Office 365, Google Workspace, and Salesforce.

Cyberattacks 2022: Phishing, Ransomware & Data Breach Statistics

Cyberattacks had yet another record-breaking year in 2022. Here’s some statistics and trends on phishing, ransomware, and data breaches to be aware of.


READ MORE >


High Availability: How It Works and Why It’s Important

High availability (HA) ensures that an IT infrastructure operates continuously, even if certain components fail. Learn why it’s important and how to achieve it.


READ MORE >


Defense in Depth: Everything to Know About the Cybersecurity Model

Defense in depth is a cybersecurity strategy that utilizes multiple layers of security for holistic protection. Learn about its benefits, key layers and more.


READ MORE >


Zero Trust Security: Everything You Need to Know

Zero trust is a security model that assumes risks are present both inside and outside of a network. Learn about technologies involved, core principles, and more.


READ MORE >


Tech Trends and Insights 2022 Survey: Tech Trends Impacting SMBs and MMEs in 2022

Tech Trends and Insights 2022 Survey Report highlights technology-related priorities and concerns of worldwide IT professionals in response to hybrid work.


READ MORE >


Data ASaaSsins: Threats That Can Cause Data Loss and Hurt Your Business

Read this blog to learn about the various threats and the threat actors that cause SaaS data loss and be detrimental to your organization or business.


READ MORE >


Data Protection Solutions: Safeguard Your Data From Cyberattacks & Other Threats

“Data really powers everything that we do.” — Jeff Weiner, executive chairman of LinkedIn It is often said that data is the new oil, which means data is the most valuable resource in the world currently. Irrespective of what data scientists and experts might say, in today’s data-driven business environment, information is one of the [...]

READ MORE >


Backup Encryption: What It Is and Why It’s Important for Data Security

Backup encryption is the process of converting backups from plaintext to ciphertext using mathematical algorithms and encryption keys for maximum data security.


READ MORE >


Social Engineering: Definition, Examples, Types of Attacks and How to Prevent Them

More than 90% of cyberattacks rely on some form of social engineering. Learn about social engineering attacks, what to look for, and how to prevent them.


READ MORE >


Cybersecurity Awareness: Definition, Importance, Purpose and Challenges

Cybersecurity awareness is an ongoing process of educating employees about the threats that lurk in cyberspace and how to act responsibly. Learn more.


READ MORE >