Cloud and Data Security RansomwareNanoCore RAT — Malware of the Month, May 2020NanoCore — Spanning’s Malware of the Month for May 2020 — is an incredibly sophisticated Remote Access Trojan (RAT) that gives hackers free rein over an infected device.Read in 5 minutes
Backup Cloud Technology Google WorkspaceGoogle Takeout: Is It a Good Backup Option?Google Takeout is a data retrieval platform that allows users to import and export data from a number of Google products. Learn more about Google Takeout’s capabilities and viability as a backup …Read in 5 minutes
Microsoft 365 Products & News FeaturesSpanning Backup for Microsoft 365 PowerShell Module Update 3.4.0.1Spanning is pleased to bring you a few updates to our popular PowerShell. This release, 3.4.0.1, adds a Connection parameter that makes automation with Azure Automation Runbooks easier and more …Read in 4 minutes
BackupTypes of Backup: Understanding Full, Differential, and Incremental BackupThere are 3 main types of backup: full, differential, and incremental. The right type of backup leads to the right SaaS backup strategy. Learn what each has to offer.Read in 4 minutes
Cloud Technology Google Workspace Microsoft 365Google Workspace Sync for Microsoft Outlook: When Foes Become FriendsWant to use Outlook and Google Workspace at the same time? Google Workspace Sync for Microsoft Outlook (GWSMO) makes that possible. Learn about GWSMO set up, requirements, benefits, downsides and …Read in 4 minutes
Cloud and Data Security Microsoft 365 Products & News FeaturesSpanning Release Notes: Microsoft 365 Backup with Integrated Dark Web MonitoringKeep your Microsoft 365 credentials and data secured with the new Spanning Microsoft 365 Backup feature — Dark Web monitoring.Read in 2 minutes
Cloud and Data SecurityIntrusion Detection Systems: A Deep Dive Into NIDS & HIDSIntrusion Detection Systems (IDS) are instrumental in guarding data from unauthorized access. Learn the main types of IDS and the role they play in data security.Read in 4 minutes
Cloud and Data SecurityInsecure Direct Object Reference (IDOR) — Web-based Application Security, Part 6Insecure Direct Object Reference (IDOR) vulnerabilities exist when direct object reference entities can be manipulated in order to gain access to otherwise private information. Learn how they work and …Read in 4 minutes
Cloud and Data SecurityOAuth 2.0: What Is It and How Does It Work?Learn what OAuth 2.0 protocol is, how open authorization works, and more importantly, why OAuth is vital for your backup vendors.Read in 3 minutes