The 8 Step-by-step Process for Offboarding Employees Gracefully

I dread offboarding. I don’t know any manager that enjoys this process. Sure, sometimes the employee moves on to bigger and better opportunities. I’m thrilled for them but it is very bittersweet. I always hate seeing them go. Or the employee is being forced out. No matter the circumstances, it’s always heart-wrenching. I’ve found that… (more) The 8 Step-by-step Process for Offboarding Employees Gracefully

The State of Offboarding Security For Remote Work

Employees are often granted access to sensitive company data, documents, and software. When an employee leaves an organization, offboarding processes serve as a way to protect the organization from intentional or accidental data breaches which can cost companies millions in revenue and reputational damages.  However, the coronavirus pandemic resulted in a rapid switch to a… (more) The State of Offboarding Security For Remote Work

Over 45% of employees admit to taking documents from former employers

Ever since pivoting Nira into a cybersecurity company focused on document access control, my co-founder Hiten and I have been curious to learn more about how employees think about security. We’d seen plenty of surveys of IT teams, but we hadn’t seen a robust dataset about employee security practices. So we surveyed 311 people working… (more) Over 45% of employees admit to taking documents from former employers

Are Personal Email Accounts Accessing Your Company Data?

Personal account access is one of the biggest data exfiltration risks a company faces—and one of the most hidden.  The current state of personal account access is precarious and affects organizations of all sizes. Every person who interacts with a company using cloud collaboration tools like Google Workspace and Microsoft OneDrive could have added their… (more) Are Personal Email Accounts Accessing Your Company Data?

How to Audit Sensitive Documents for Access Risks

Who has access to your company’s confidential files? This question is becoming more and more relevant as companies turn to cloud collaboration tools like Google Workspace, Microsoft OneDrive, and SharePoint.  Data breaches caused by unauthorized access, what we call access risks, have risen at alarming rates as companies use collaboration tools to share files within… (more) How to Audit Sensitive Documents for Access Risks

Google Security Investigation Tool: Remove Users, Change Ownership, and More

For investigations in Google Workspace, Google offers its powerful Security Investigation Tool. If you’re a super administrator on the Enterprise Plus, Education Standard, Education Plus, or Enterprise Essentials Plus plans, you can access this potent feature.  The investigation tool allows administrators to conduct searches in different Google Workspace data sources including Gmail, Chrome, and Google… (more) Google Security Investigation Tool: Remove Users, Change Ownership, and More

7 Limitations of Google’s Security Investigation Tool & How to Solve Them

The Google Workspace Security Investigation Tool (GSIT) is an integral part of securing every data source—from Gmail to Google Drive. Introduced in 2018, the tool helps security analysts and super administrators conduct investigations and reduce risks. Although it can be a powerful tool for investigations, Google’s security tool has its limitations. In this post, we’ll address… (more) 7 Limitations of Google’s Security Investigation Tool & How to Solve Them

Google’s Security Investigation Tool: Top 9 Use Cases for Drive

With 82% of breaches involving data stored in the cloud, IT, Compliance, and Security professionals need every tool available to help with investigations in tools like Google Workspace.  Enter Google’s Security Investigation Tool (GSIT). In 2018, the tool was introduced to help administrators and security analysts identify, triage, and remediate security threats. It’s a powerful… (more) Google’s Security Investigation Tool: Top 9 Use Cases for Drive

Every company that uses Google Workspace should be using Nira.
Bryan Wise
Bryan Wise,
Former VP of IT at GitLab

Incredible companies use Nira