Cross-Site Scripting (XSS) — Web-based Application Security, Part 3

Cross-site scripting (XSS) is a technique in which malicious scripts are stored on and unknowingly retrieved from trusted websites by unsuspecting victims. Learn how to safeguard against this threat to your sensitive data.
The post Cross-Site Scriptin… Continue reading Cross-Site Scripting (XSS) — Web-based Application Security, Part 3

Emotet: The Banking Trojan — Malware of the Month, May 2019

Emotet — a banking trojan malware program that the Center for Internet Security (CIS) calls one of the “most costly and destructive malware” — is Spanning’s first spotlight in a new series titled “Malware of the Month.” Every month, S… Continue reading Emotet: The Banking Trojan — Malware of the Month, May 2019

The Why, What and How of Migrating from G Suite to Office 365

If your organization is contemplating a migration from G Suite to Office 365, it’s best to first consider three questions: Why migrate?… What is the current data landscape?… and how should you proceed with the migration? Answering these questions a… Continue reading The Why, What and How of Migrating from G Suite to Office 365

Web-based Application Security: Part 2: Cross-Site Forgery

Cross-site forgery (CSRF) is a malicious technique designed to take advantage of unsuspecting users who are actively logged into web applications. Learn more about this threat to your data and how to safeguard against it.
The post Web-based Application… Continue reading Web-based Application Security: Part 2: Cross-Site Forgery

Web-based Application Security Part 1: Open Redirection Vulnerability

Understanding open redirection vulnerabilities is key to detecting them and protecting your organization’s data. Without proper validation, attackers can redirect victims from trusted to malicious sites, or use forwards to access unauthorized pag… Continue reading Web-based Application Security Part 1: Open Redirection Vulnerability

Gmail Recovery Made Easy: Get Lost Gmail Back in Just a Few Clicks

As a G Suite admin, you’re likely familiar with panic-struck end users asking you to restore Gmail messages that are lost. Here are some common Gmail data loss scenarios, with steps to use Spanning Backup to restore email messages in a couple of clicks… Continue reading Gmail Recovery Made Easy: Get Lost Gmail Back in Just a Few Clicks

2019 SaaS Trends: If the Climate’s Sunny, Why’s the Forecast Mixed?

The adoption of SaaS applications is projected to grow at double-digit rates through 2019, according to Bain & Co.; projections for SaaS growth per Gartner are similar. In 2019, those organizations wanting the benefits of SaaS applications will fin… Continue reading 2019 SaaS Trends: If the Climate’s Sunny, Why’s the Forecast Mixed?

Business Continuity and Disaster Recovery: Your Organization’s Safety Plan

From hurricanes, errant employees, malware to even a rodent with an appetite for cables — the likelihood of an organization suffering data loss has never been greater. An organization’s best defense is to plan for business continuity and disaster… Continue reading Business Continuity and Disaster Recovery: Your Organization’s Safety Plan

Gone Phishing: Everything You Need to Know About the Ever Present Threat to Your Data

Phishing is a critical security issue that can trick even the most diligent, security-minded users. How do you protect your organization from being another phish in the sea? Let’s start by understanding how phishing works and then move on to pra… Continue reading Gone Phishing: Everything You Need to Know About the Ever Present Threat to Your Data