Assess the Risk of Browser Extensions Installed in Your Browser. Add to Chrome.×

William Tran

Avatar photo

William Tran

Product Manager at Spin.AI

Will Tran is the Product Manager at Spin.AI, where he guides the product's strategic direction, oversees feature development and ensures that the solution solves his clients’ cybersecurity needs.

Will is a security professional who started his career at Lockheed Martin where he worked on National Security Space programs in business development and product management.

Will holds a BA in Economics and Mathematics from UCSB and an MBA with a specialization in Technology Management and Marketing from UCLA Anderson School of Management.

At Lockheed Martin, Will developed the multi-year strategy campaign and supported the product development of a national security satellite program for the United States Air Force, which resulted in a multi-billion dollar contract.

During business school, Will consulted 2 non-profit organizations as part of a series of national consulting case competitions. He set strategic priorities, optimized business operations, and developed a process to qualify new revenue streams for his non-profit clients. These initiatives resulted in 15-20% increase in annual surplus.

In his spare time, Will can be found at local coffee shops around Los Angeles, traveling to different countries, or hanging out with his cat.

Blog Posts by William Tran

How to Enable Multi Factor Authentication Office 365

How to Enable Multi Factor Authentication Office 365

Multifactor authentication can protect your MSO 365 environment from unauthorized access and possible data loss...

Avatar photo

Product Manager

Read more
Salesforce Shield: a Comprehensive Overview for SMBs

Salesforce Shield: a Comprehensive Overview for SMBs

Salesforce Shield is a powerful security tool by Salesforce. In this article, we review the...

Avatar photo

Product Manager

Read more
How to Setup Gmail in Outlook: a Step-by-Step Guide

How to Setup Gmail in Outlook: a Step-by-Step Guide

Gmail or Outlook? Why not both? Google Mail is a practical choice both for individuals...

Avatar photo

Product Manager

Read more
How to Back up Google Drive: A Step-by-Step Guide

How to Back up Google Drive: A Step-by-Step Guide

This article is a complete guide on how to back up Google Drive data. It...

Avatar photo

Product Manager

Read more
Google Drive Ransomware Protection | CISO’s Guide

Google Drive Ransomware Protection | CISO’s Guide

Despite multilayered security, Google Workspace is vulnerable to ransomware attacks. Every once in a while...

Avatar photo

Product Manager

Read more
Google Account Recovery: How to Recover Gmail Messages, History, and Data

Google Account Recovery: How to Recover Gmail Messages, History, an...

Google is the undisputed tech behemoth of today’s digital landscape. Millions of dynamic businesses and...

Avatar photo

Product Manager

Read more
Backup to Google Drive: Tips and Tricks

Backup to Google Drive: Tips and Tricks

Google Drive was launched in 2012 and now boasts over one million business and personal...

Avatar photo

Product Manager

Read more
The Latest Cybersecurity Statistics By Category

The Latest Cybersecurity Statistics By Category

Previous years had shown the continuous rise of various digital threats. Cybersecurity professionals are not...

Avatar photo

Product Manager

Read more
How to Recover Deleted Files from Google Drive

How to Recover Deleted Files from Google Drive

Accidental and intentional file deletion is extremely common among corporate employees. Some Google Workspace users...

Avatar photo

Product Manager

Read more
Insider Threat Software for Google Workspace Security

Insider Threat Software for Google Workspace Security

Not all security threats come from outside your organization. Employees are a leading cause of...

Avatar photo

Product Manager

Read more
6 Best Practices for Microsoft 365 Security Monitoring for Admins

6 Best Practices for Microsoft 365 Security Monitoring for Admins

The purpose of this article is to outline the best practices for Microsoft 365 security...

Avatar photo

Product Manager

Read more
Office 365 Phishing Email: How to Detect and How to Avoid

Office 365 Phishing Email: How to Detect and How to Avoid

Hackers know it’s easier to track an organization’s employees than to break through its security...

Avatar photo

Product Manager

Read more
Office 365 SharePoint Backup Options

Office 365 SharePoint Backup Options

Definitely, SharePoint data loss is not an option. Office 365 Sharepoint backup is the best...

Avatar photo

Product Manager

Read more
Office 365 Cloud Backup vs. On-Premise Backup: Where to Store my Data?

Office 365 Cloud Backup vs. On-Premise Backup: Where to Store my Data?

Continuous backup is crucial for your business, especially when all operations rely on data, to...

Avatar photo

Product Manager

Read more
How to Backup Gmail: Guide for On-prem & Cloud Tools

How to Backup Gmail: Guide for On-prem & Cloud Tools

Are you trusting Gmail with your most vital business communications? You’re not alone. With its...

Avatar photo

Product Manager

Read more
Import MBOX to Gmail: A How-to Guide

Import MBOX to Gmail: A How-to Guide

Losing Gmail data can be harmful to companies. Unfortunately, Gmail is not entirely secure from...

Avatar photo

Product Manager

Read more
Google Contacts Recovery: Step-by-Step Guide

Google Contacts Recovery: Step-by-Step Guide

In the world of sales, contact data is necessary to keep performance at the required...

Avatar photo

Product Manager

Read more
How to Transfer OneDrive Files to Another Account Employee Turnover & Transitions

How to Transfer OneDrive Files to Another Account Employee Turnover...

Employee turnover and internal transitions might be challenging for IT Admins when it comes to...

Avatar photo

Product Manager

Read more