Spanning Blog

Welcome to our blog featuring thought leadership and best practices on SaaS backup and recovery, data protection and security, and regular product updates for Spanning Backup for Office 365, Google Workspace, and Salesforce.

Google Drive Trash: Deleting, Recovering and Everything in Between

Learn all about the Google Drive Trash folder and how Spanning acts as a safety net for items that might otherwise be lost forever.


READ MORE >


Spanning Blog: The Best of 2020

The Spanning blog provides important insights into the world of enterprise data protection. Here’s a recap of the most popular blogs from 2020.


READ MORE >


SharePoint Online: Everything You Should Know

SharePoint Online is a powerful web-based application used for collaboration and information exchange across an organization. Learn all you need to know.


READ MORE >


Data Retention Policy: What It Is and How to Create One

A data retention policy guides what data should be stored or archived, where that should happen and for how long. Download a free data retention template to get started.


READ MORE >


Spanning Release Notes: Office 365 Backup MSP Edition

Spanning Office 365 Backup MSP Edition offers comprehensive protection against Office 365 data loss, ensuring seamless business continuity.


READ MORE >


Total Cost of Ownership: Why It’s Important for Businesses

A total cost of ownership (TCO) analysis is vital to examine the financial impact of implementing new technologies in business. In information technology, assessing the TCO provides a broader view of the investment and the value of the product over its lifespan.


READ MORE >


Google Drive Trash Retention Reduced by 10,000 Years

As of October 13, 2020, all files placed in Google Drive trash will be permanently deleted after 30 days. Previously, these files would be retained indefinitely unless manually deleted by the user. Learn what this means for Google Workspace users moving forward.


READ MORE >


Directory Traversal — Web-based Application Security, Part 8

Directory traversal is a web application security vulnerability that allows unauthorized users to access files from different folders or directories that they would otherwise be restricted from accessing.


READ MORE >


Mobile Malware: What Makes It Dangerous?

Cybercriminals are using mobile malware to get their hands on business data stored on your smartphone. Learn all about the types of mobile malware out there and what protection measures you can take to repel them.


READ MORE >


Types of Cyber Attacks: A Closer Look at Common Threats

By understanding the different types of cyber attacks and how they are executed, you can identify potential threats and take the required steps to prevent them if a cybersecurity event occurs.


READ MORE >

[class^="wpforms-"]
[class^="wpforms-"]
[class^="wpforms-"]
[class^="wpforms-"]