Spanning is very pleased to announce two new features for Spanning Backup for Office 365 that we think will delight Spanning Admins and users: Contacts and Site Collections backup.
Kovter — a malware that has evolved from a trojan-based ransomware to a click fraud malware and then to a fileless one — is Spanning’s Malware of the Month for October 2019. Learn how Kovter works and how it has stayed among the most prolific malware in recent years.
Multi-factor Authentication (MFA) combines what the user knows (password), with what the user has (security token) and what the user is (biometric verification) to ensure user identity. Learn why this verification method is vital in today’s world.
XML External Entity (XXE) attacks are a form of injection attack that target weak XML parsers with the goal of exposing confidential information that should typically not be accessible. Learn how they work and how to protect against them.
Joe Noonan, VP of Products for Unitrends and Spanning, details why a strong prevention plan that includes good backups and the discipline to manage the backups correctly is the best way to beat ransomware.
Since 2015, Unitrends, a leading all-in-one enterprise backup solution provider, has conducted their annual Cloud and Disaster Recovery Survey to gauge the state of data backup across a wide range of organizations. Here are some of the major takeaways from this year’s survey report, Growing Usage of SaaS Data Protection – Unitrends 2019 Survey.
TrickBot, at its root, is a form of Trojan malware. Like its namesake, malware of this type cleverly disguises its true intent. What’s even more dangerous is that TrickBot is constantly evolving with increasingly potent attacks. Learn more about our Malware of the Month for August, 2019, and what you can do to stay prepared.
Migrating from one platform to another, particularly one that forms the bedrock of an organization, can be extremely stressful and sub-optimal if not carefully charted. Here are some pointers to lay the groundwork for one such transformational change: migrating from Office 365 to G Suite.
The CIA Triad, or Confidentiality-Integrity-Availability, is a flexible model that can be applied to help secure your organization’s information systems, applications, and network. Learn about the three pillars of the framework and how you can implement them into your org’s information security protocol.
A comprehensive backup strategy is an essential part of an organization’s cyber safety net and it’s important to have one outlined & put in place before a data loss event occurs. Follow these four steps to help you form a strategy that is right for your organization.