Spanning Blog

Welcome to our blog featuring thought leadership and best practices on SaaS backup and recovery, data protection and security, and regular product updates for Spanning Backup for Office 365, Google Workspace, and Salesforce.

Backup Policy: What Should Be Included and Why Do You Need One?

A backup policy defines the set of policies, procedures and responsibilities to prevent data loss and maintain data integrity and availability. Learn more.


READ MORE >


Defense in Depth: Everything to Know About the Cybersecurity Model

Defense in depth is a cybersecurity strategy that utilizes multiple layers of security for holistic protection. Learn about its benefits, key layers and more.


READ MORE >


SaaS Data Restoration Made Easy With Spanning Backup End User Self-Service

Find out how Spanning Backup End User Self-Service is the perfect remedy to the chaotic environment an organization experiences after a data loss incident.


READ MORE >


Zero Trust Security: Everything You Need to Know

Zero trust is a security model that assumes risks are present both inside and outside of a network. Learn about technologies involved, core principles, and more.


READ MORE >


How Phishing Attacks Ruin Microsoft 365 and Google Workspace

Cyberthreats adversely impact your SaaS applications and data. Here’s a look at how phishing affects your Microsoft 365 and Google Workspace environment.


READ MORE >


Tech Trends and Insights 2022 Survey: Tech Trends Impacting SMBs and MMEs in 2022

Tech Trends and Insights 2022 Survey Report highlights technology-related priorities and concerns of worldwide IT professionals in response to hybrid work.


READ MORE >


BCDR: Why Business Continuity and Disaster Recovery Is Essential

Business continuity and disaster recovery (BCDR) processes are essential for organizations to avoid downtime in the wake of an interruption. Learn more.


READ MORE >


Spanning Q3 2022 Roundup: Feature Releases and Innovations

At Spanning, we constantly innovate our solutions in order to optimize features, functionality, security and user experience. Find out what’s new in Q3 2022.


READ MORE >


Data ASaaSsins: Threats That Can Cause Data Loss and Hurt Your Business

Read this blog to learn about the various threats and the threat actors that cause SaaS data loss and be detrimental to your organization or business.


READ MORE >


Ransomware Recovery: How to Respond to Ransomware Attacks

Ransomware recovery is the process of restoring critical systems and resuming business functions to an operational state after an attack. Learn more.


READ MORE >