In Part 1 of this two-part series, we discussed how you need to rely on more than the default retention times for Office 365 to fully protect your data from accidental deletion. In Part 2, we’ll discuss if Exchange Online Litigation Hold and In-Place Hold are good-enough data protection solutions for Office 365, or if your organization may need something purpose-built for Office 365 backup and restore.
After exhibiting at this year’s Microsoft Ignite, we’re even more energized by the growth of the Microsoft community. For us, one of the best parts of the show was meeting our amazing customers. From the bustling, vibrant show floor to our more personal customer happy hour, we love seeing the Spanning family grow each year. As we mentioned in our pre-event blog post, there were many things we were looking forward to attending. How did it actually turn out? Catch up on the rest of our Ignite adventures in this blog post.
Data protection in Office 365 is a shared responsibility, with Microsoft taking on the tasks that would have typically been done on-premises for disaster recovery. But your IT team is still ultimately responsible for data protection, and it’s up to the IT team to decide how to protect and recover any data that is lost by human error or even malicious attacks. In Part 1, we look at Microsoft’s disaster recovery and retention times.
Now in its 24th year, Microsoft Ignite is moving beyond its format of feature deep-dives and MVP meet-ups to introducing cutting-edge, emerging technologies. With more than 700 deep-dive sessions and 100 expert-led and self-paced workshops, it will keep you on your toes. What are our picks of the sessions we will be attending? It’s a tough call, but here’s a countdown of our Top 4 #MSIgnite sessions for 2018.
Peace of mind is a recurring theme among many Spanning customers and Millar is no different. Learn how Spanning provides the Millar team with peace of mind as they protect their data while developing life-saving medical devices, and see how protecting your Office 365 data can protect your organization from unnecessary SaaS application data loss.
On June 22, 2018, Microsoft announced a public preview of a new security policy which will enable multi-factor authentication (or MFA) for Azure Active Directory “privileged accounts” (or administrator accounts), including most Office 365 admin accounts. After the preview, they will automatically opt these accounts into the policy by default, adding a much needed layer of security to these accounts. Spanning Backup for Office 365’s Sr. Product Manager Andy Rouse explains why this is a good thing in his newest blog post.
A good governance plan is essential to helping your organization achieve its goals and mission. In addition, a good governance plan is key to maintaining risk management and compliance. In this blog post, you’ll learn practical definitions of what governance is — and what it isn’t — and why and how to go beyond good governance to data protection.
Because Office 365 admins can do more with PowerShell, we’ve extended the capabilities of Spanning Backup for Office 365 with a Spanning-built PowerShell module that works in conjunction with our REST API to automate activities in Spanning such as assigning or unassigning individual and bulk licenses. Learn how it works.
One of the best practices in well run IT organizations is for CIOs and IT managers to evaluate the risk of data loss, and establish business continuity plans that outline backup and recovery along with their respective Recovery Point Objectives (RPOs) and Recovery Time Objectives (RTOs). But first, information technology teams and business stakeholders must start with a common understanding of what RTO and RPO mean in terms of backup and recovery.
Over the past few years, there has been a stunning increase in the number and sophistication of ransomware attacks. Microsoft products and services have been targeted by cybercriminals for decades — now that Office 365 is the company’s fastest-growing solution, it’s a primary target. Given the great risks for losses at the hands of cybercriminals, every member of your organization — from your COO to each individual employee — must take proactive measures to protect the organization’s data.