AI Powered Ransomware Protection and Backup Made Simple. What to learn more about Spin Technology? Contact us here.

    Workspace Login (Old)     |     Workspace Login (New)     |     Office 365 Login     |     Request Demo     |     Free Trial     |     Support   

    News

    Spin Technology Introduces the Next Generation of Google Workspace Management in SpinOne 2021

    Spin Technology Introduces the Next Generation of Google Workspace Management in SpinOne 2021

    PALO ALTO, Calif.--(BUSINESS WIRE)--Today, Spin Technology, Inc., announced the next generation of SpinOne, an AI-powered ransomware protection and backup solution for Google Workspace and Office 365. In the last year alone, 51 percent of organizations were targeted by ransomware, and cybersecurity continues to be a top concern...
    The Impact of Ransomware on Cloud Services and How to Stop Attacks – Cyber Defense Magazine
    Cyber Defense Magazine

    The Impact of Ransomware on Cloud Services and How to Stop Attacks – Cyber Defense Magazine

    With so many organizations moving to the cloud, ransomware is a real concern for businesses everywhere. Spin’s Davit Asatryan recently sat down with @cyberdefensemagazine to discuss the impact of ransomware on cloud services and how to stop attacks. See his article in the November issue here
    How HR Teams Can Minimize the Risks of Cybersecurity Threats
    HR.com

    How HR Teams Can Minimize the Risks of Cybersecurity Threats

    Cybersecurity threats are a significant concern for businesses across the board, especially those currently supporting remote workers due to the coronavirus pandemic. How can your HR team make sure they’re minimizing cybersecurity risks? Check out our latest article on HR.com
    Spin Technology Introduces Risk Assessment for G Suite Applications and Chrome Extensions

    Spin Technology Introduces Risk Assessment for G Suite Applications and Chrome Extensions

    PALO ALTO, Calif.--(BUSINESS WIRE)--Today, Spin Technology, Inc., announces the general availability of Application and Chrome Browser Extension Auditing for G Suite in a new offering called Spin Risk Assessment. Spin Risk Assessment reviews all marketplace and non-marketplace applications and extensions connected to an organization’s G...
    Spin Technology Introduces Cyber Liability Insurance

    Spin Technology Introduces Cyber Liability Insurance

    Spin Technology, Inc., today introduced Cyber Liability Insurance for SpinOne. This additional offering provides a policy that new and existing SpinOne customers can acquire to provide additional protection for their organization. Cyber liability insurance includes safeguards for businesses in the event that their organization is...
    The Science Of Orchestrating Apps And Extensions For Enterprises
    Forbes

    The Science Of Orchestrating Apps And Extensions For Enterprises

    One of the root problems of app security is lack of control. By 2023, Gartner predicts that “40% of professional workers will orchestrate their business application experiences and capabilities like they do their music streaming services.” Individuals within large organizations can install apps and extensions without the IT department's knowledge. This makes shadow IT one of the biggest threats to organizations in 2020.
    G Suite a Key Target: Keep Your Data Protected
    networkcomputing.com

    G Suite a Key Target: Keep Your Data Protected

    Security issues using cloud-based office applications are compounded as more employees work from home, thus driving the need for enhanced data protection. For many organizations, Google’s G Suite is an integral piece of the day-to-day operations of running a business. From emails to spreadsheets, sensitive company data is now easily accessible to your team on desktops, laptops, and smartphones, improving efficiency and productivity.
    5 keys to protecting OneDrive users
    helpnetsecurity.com

    5 keys to protecting OneDrive users

    With the dramatic shift toward remote workforces over the last three months, many organizations are relying more heavily on cloud tools and application suites. One of the most popular is Microsoft’s OneDrive. While OneDrive may seem like a secure cloud storage solution for companies looking to use Microsoft’s suite of business tools, many glaring security issues can expose sensitive data and personally identifiable information (PII) if proper protection protocols are ignored. Data theft, data loss, ransomware