How to Audit Sensitive Documents for Access Risks

Who has access to your company’s confidential files? This question is becoming more and more relevant as companies turn to cloud collaboration tools like Google Workspace, Microsoft OneDrive, and SharePoint.  Data breaches caused by unauthorized access, what we call access risks, have risen at alarming rates as companies use collaboration tools to share files within… (more) How to Audit Sensitive Documents for Access Risks

The 10 Types of Sensitive Data Companies Must Protect

Keeping sensitive data secure from theft and vulnerabilities can be incredibly challenging. With limited budget and bandwidth, IT and Security teams are expected to protect sensitive information while introducing strong security solutions. To protect sensitive data from getting into the wrong hands, companies first must understand what counts as sensitive data. This guide explores the… (more) The 10 Types of Sensitive Data Companies Must Protect

Google Security Investigation Tool: Remove Users, Change Ownership, and More

For investigations in Google Workspace, Google offers its powerful Security Investigation Tool. If you’re a super administrator on the Enterprise Plus, Education Standard, Education Plus, or Enterprise Essentials Plus plans, you can access this potent feature.  The investigation tool allows administrators to conduct searches in different Google Workspace data sources including Gmail, Chrome, and Google… (more) Google Security Investigation Tool: Remove Users, Change Ownership, and More

7 Limitations of Google’s Security Investigation Tool & How to Solve Them

The Google Workspace Security Investigation Tool (GSIT) is an integral part of securing every data source—from Gmail to Google Drive. Introduced in 2018, the tool helps security analysts and super administrators conduct investigations and reduce risks. Although it can be a powerful tool for investigations, Google’s security tool has its limitations. In this post, we’ll address… (more) 7 Limitations of Google’s Security Investigation Tool & How to Solve Them

Google Workspace Security Investigation Tool: Guide to the Condition Builder

The Google Workspace Security Investigation Tool has become a critical piece of the security stack for companies using Google Workspace. The tool can be used with a range of Google services, from Chrome to Gmail, helping administrators and security analysts with investigations. Administrators may use the condition builder to conduct investigations and searches within the security… (more) Google Workspace Security Investigation Tool: Guide to the Condition Builder

Getting Started with the Google Workspace Security Investigation Tool

Data breaches and security threats are increasing, and so are their financial impacts. In 2023, the average global cost of a data breach was $4.45 million, according to IBM. In the United States, this figure soared to an alarming $9.48 million, surpassing all other countries. Beyond the financial aspect, data breaches result in reputational harm,… (more) Getting Started with the Google Workspace Security Investigation Tool

7 Tips for Setting up the Security Investigation Tool in Google Workspace

Launched in 2018, Google Workpace’s Security Investigation Tool (GSIT) was designed to assist administrators and security analysts in recognizing and remediating security threats to their company’s Google Workspace. It serves as a robust solution for conducting investigations while IT, Security, and Compliance teams work to mitigate risks within their organizations. Using GSIT is a fundamental… (more) 7 Tips for Setting up the Security Investigation Tool in Google Workspace

Incredible companies use Nira

Every company that uses Google Workspace should be using Nira.
Bryan Wise
Bryan Wise,
Former VP of IT at GitLab

Incredible companies use Nira