Spanning Blog

Welcome to our blog featuring thought leadership and best practices on SaaS backup and recovery, data protection and security, and regular product updates for Spanning Backup for Office 365, Google Workspace, and Salesforce.

Insider Threats: How to Protect Your Business and Data From the Enemy Within

Insider threats are security risks that originate from within an organization. Learn about different types, key indicators, and how to protect your data against them.


READ MORE >


Password Spraying: What It Is and How to Prevent It

Password spraying is a high-volume brute force attack that takes advantage of users’ bad password practices. Learn how it works and how to prevent it.


READ MORE >


The SaaS Backup and Recovery Report 2022: What’s New in the SaaS Universe

The SaaS Backup and Recovery Report 2022 from Spanning provides new insights into the SaaS universe, the current state of SaaS data protection and what you should know to enhance your data protection strategy.


READ MORE >


Why Email Security Matters

Email security is vital to prevent data loss and unauthorized access to sensitive data. Learn why it should be a main pillar of your cybersecurity strategy.


READ MORE >


Exchange Online Protection (EOP): What It Does, How It Works, Key Features and Limitations

Exchange Online Protection (EOP) helps protect against spam, malware and other email-based threats. Learn more about its features and limitations.


READ MORE >


Cyberattacks 2021: Phishing, Ransomware & Data Breach Statistics From the Last Year

A close look at cyberattack statistics in 2021 and how to better protect your business against phishing, ransomware & data breaches moving forward.


READ MORE >


Types of Malware: How to Detect and Prevent Them

Malware attacks are costly and destructive. Learn about the different types of malware, how they work and how to protect your data from these threats.


READ MORE >


Cyber Resilience and Its Importance for Your Business

Cyber resilience helps businesses better defend against cyber crimes, mitigate risks and severity of attacks, and enables business continuity. Learn more.


READ MORE >


5 Microsoft Teams Security Best Practices for Better Collaboration

Learn the top five Microsoft Teams security best practices to keep sensitive information secure while allowing users to collaborate seamlessly.


READ MORE >


File Inclusion Vulnerabilities — Web-based Application Security, Part 9

PHP File Inclusion represents a security flaw in web applications that can result in information disclosure. Learn more about LFI and RFI vulnerabilities.


READ MORE >