NanoCore RAT — Malware of the Month, May 2020

NanoCore RAT — Malware of the Month, May 2020

NanoCore — Spanning's Malware of the Month for May 2020 — is an incredibly sophisticated Remote Access Trojan (RAT) that gives hackers free reign over an infected device ... Read More
A representation of Google Takeout — a box with various Google data icons coming out of it.

Google Takeout: Is It a Good Backup Option?

Google Takeout is a data retrieval platform that allows users to import and export data from a number of Google products. Learn more about Google Takeout's capabilities and viability as a backup option ... Read More
Pitching SaaS Backup: 3 Obstacles to Expect

Pitching SaaS Backup: 3 Obstacles to Expect

Decision makers are often slow to recognize the value in a SaaS backup solution, even though the merits of Office 365 or G Suite backup are well known. Find out why and how to overcome the common obstacles faced ... Read More
A basic graphic displaying the difference between full backup, differential backup, and incremental backup.

Types of Backup: Understanding Full, Differential, and Incremental Backup

| | Backup
There are 3 main types of backup: full, incremental and differential. The right type of backup leads to the right SaaS backup strategy. Learn what each has to offer ... Read More
How to Connect Microsoft Outlook to Google G Suite / Google Apps

G Suite Sync for Microsoft Outlook: When Foes Become Friends

Want to use Outlook and G Suite at the same time? G Suite Sync for Microsoft Outlook (GSSMO) makes that possible. Learn about GSSMO set up, requirements, benefits, downsides and more ... Read More
A picture of two medicine bottles meant to convey the value of SaaS backup with risk mitigation.

Risk Mitigation: How SaaS Backup Addresses Operational Risk

Looking for the best risk mitigation tactic to curb operational risks? Learn how a good backup solution can help, and how you can prove its business value to the leadership team using the Spanning Backup ROI Calculator ... Read More
IDS| HIDS Vs NIDS| Host based Intrusion Detection System Vs Network Based Intrusion Detection System

Intrusion Detection Systems: A Deep Dive Into NIDS & HIDS

Intrusion Detection Systems (IDS) are instrumental in guarding data from unauthorized access. Learn the main types of IDS and the role they play in data security ... Read More
OAuth 2.0 access tokens explained

OAuth 2.0: What Is It and How Does It Work?

| | Cloud and Data Security
Learn what OAuth 2.0 protocol is, how open authorization it works, and more importantly, why OAuth is vital for your backup vendors ... Read More
Examples of personally identifiable information as defined by the California Consumer Privacy Act (CCPA).

CCPA: Salesforce Administrators Must Rethink Backup

Salesforce administrators under the CCPA need to rethink their backup and recovery strategies to ensure personal information is accurately backed up ... Read More
Cybersecurity Skills Gap  | Cybersecurity Insights #20

10 Cybersecurity Trends in 2020 You Need to Keep an Eye On

As data moves to SaaS apps like G Suite and Office 365, so will the focus of cybercriminals. Be on top of cybersecurity trends in 2020 to keep your business ahead of the game ... Read More