Spanning’s Best of 2019

It’s that time of the year again; filled with festive cheer and thoughtful review. As 2019 draws to an end, we take a look back on the blogs and resources most enjoyed by you. The resulting list provides an insightful overview of the challenges associated with enterprise data protection. From malware, identity theft and compliance practices to data protection strategies and SaaS migrations, here is a brief recap of trending topics and Spanning’s most popular content from 2019:

#10. SaaS Data Protection Strategies & Trends

As companies move their business-critical applications to the cloud, it is important to stay aware of evolving SaaS data protection strategies. Unitrends’ study, Growing Usage of SaaS Data Protection, surveyed more than 400 organizations of all sizes and industries to examine the state of data backup, recovery, DRaaS, and the progressive use of the cloud in data protection.

A similar study conducted by ESG, Data Protection Cloud Strategies: Protecting Data To and In the Cloud, surveyed 370 IT professionals at organizations in North America. The study focused on individuals responsible for data protection technology decisions with an emphasis on those leveraging cloud services as part of their organization’s solution. Together, the two reports offer great insight into the current landscape of SaaS data protection.

#9. Web-based Application Security

Every organization, large or small, has a digital presence that is a critical business driver; thus making web-application security an important cybersecurity concern. As such, we spotlighted security issues such as Open Redirection Vulnerabilities and SQL Injection Attacks (SQLi) as part of a blog series in which we analyzed various web-based application vulnerabilities and provided tips to detect and overcome them.

#8. Multi-Factor Authentication (MFA)

A majority of data breaches are due to weak or compromised credentials. The modern software stack is comprised of a number and variety of third-party SaaS apps. A security lapse in any one of the connected applications would mean a breach of your network as well. So how do you secure your SaaS applications, data, and network? MFA stringently protects the application’s entry point by reducing the dependence on passwords. Our blog, Why Multi-Factor Authentication (MFA) Is a Must-Have in the Microsoft World and Beyond, explains the growing importance of MFA and why it is being mandated by Microsoft and top SaaS platforms.

#7. Security & Compliance in Office 365

Spanning and CollabTalk joined forces to conduct a survey that revealed the major pain points organizations face when managing security and compliance governance for Microsoft Office 365. With GDPR, HIPAA, SOX and other data regulatory laws taking center stage, it’s imperative for your organization to be audit-ready by identifying and mitigating compliance risks. Our survey report, Organizational Security & Compliance Practices in Office 365, will help you do just that. 

#6. Malware of the Month

A data breach costs an enterprise $3.86 million on average. Apart from the financial costs are crippling losses to reputation, brand and customer base. In our popular Malware of the Month series, we profiled a potent malware strain each month and provided best practices to protect your organization. Read on for the scoop on malwares such as Emotet, Trickbot, Kovter and, most recently, Dridex.

#5. Social Engineering

Cybersecurity is a key business concern for organizations worldwide. In today’s age, hackers are using stealthier methods than ever to breach into an organization’s network. In our blog, Social Engineering: The Insider Threat to Cybersecurity, we took a closer look at various social engineering techniques used to gain insider access to sensitive data. Check out the post to learn how these techniques trick employees into installing malware or unknowingly pass on their security credentials.

#4. The CIA Triad

All the advice and pointers around cybersecurity can be quite confusing. Wouldn’t it be great to have a proven framework to ensure that an organization’s cybersecurity is both in-depth and comprehensive? Explore the CIA Triad — an elegantly flexible model to secure your organization’s information systems, applications, and network.

#3. Identity Theft & the Dark Web

Just as the organization is grappling its way through the damaging after-effects of a data breach, comes the bad news that their customers’ credentials have been leaked out on the dark web. Get an overview of the ominous-sounding dark web, understand ways to monitor it and prevent devastating identity theft with our illuminating blog, Identity Theft on the Dark Web: Understanding the Full Impact of a Data Breach.

#2. Forming a Backup Strategy

For disaster recovery to be all-encompassing and consequently effective, it is essential to design a backup strategy that prioritizes quick recovery and ensures business continuity. Matt McDermott, our Director of Product Management and thirteen-time Microsoft Office Apps and Services MVP, provides a four-step framework to developing a dependable backup strategy.

#1. Migrating from G Suite to Office 365

Spanning’s most popular piece from 2019 is one that demystifies the confusing maze of migration. Our blog, The Why, What and How of Migrating from G Suite to Office 365, details four steps to optimizing your ROI from Office 365 upon migrating from G Suite. Holistic adoption of any SaaS platform comes with plenty of challenges, so be sure to check this one out if your organization is making the switch.

And We End 2019 with a BIG Thank You!

Can’t end the year without a big shout-out to you — our customers and readers. We thrive thanks to your support and strive to continue to delight you with our backup and recovery solutions. 

Be sure to subscribe to our blog for regular insights on cybersecurity and SaaS platform know-how from our team of thought leaders. And don’t forget to secure your data on the cloud with our secure and reliable backup and recovery solution.

Start 2020 by Securing Your SaaS

Download Spanning Now

*** This is a Security Bloggers Network syndicated blog from Spanning authored by Emily Hurn. Read the original post at: