Articles about Data Security

Security Risks from Deploying Generative AI: Google Gemini vs. Microsoft Copilot

Companies are eager to deploy generative AI assistants like Google Gemini and Microsoft Copilot, but security professionals have concerns. Privacy issues, manipulation by threat actors, and exposure of sensitive data are all risks organizations must be aware of when using these tools.  The time savings and economic gains of AI chatbots are enticing. Gemini and… (more) Security Risks from Deploying Generative AI: Google Gemini vs. Microsoft Copilot

How to Reduce Information Security Risks When Deploying Copilot for Microsoft 365

The mass adoption of generative artificial intelligence has outpaced security measures as companies rush to develop and release AI-powered products. Microsoft launched Copilot, Google released Gemini, and OpenAI has made headlines with ChatGPT. Organizations are eager to test AI assistants for company tasks, from creating content to writing code. But developing technology comes with new… (more) How to Reduce Information Security Risks When Deploying Copilot for Microsoft 365

How to Audit Sensitive Documents for Access Risks

Who has access to your company’s confidential files? This question is becoming more and more relevant as companies turn to cloud collaboration tools like Google Workspace, Microsoft OneDrive, and SharePoint.  Data breaches caused by unauthorized access, what we call access risks, have risen at alarming rates as companies use collaboration tools to share files within… (more) How to Audit Sensitive Documents for Access Risks

The 10 Types of Sensitive Data Companies Must Protect

Keeping sensitive data secure from theft and vulnerabilities can be incredibly challenging. With limited budget and bandwidth, IT and Security teams are expected to protect sensitive information while introducing strong security solutions. To protect sensitive data from getting into the wrong hands, companies first must understand what counts as sensitive data. This guide explores the… (more) The 10 Types of Sensitive Data Companies Must Protect

Google Security Investigation Tool: Remove Users, Change Ownership, and More

For investigations in Google Workspace, Google offers its powerful Security Investigation Tool. If you’re a super administrator on the Enterprise Plus, Education Standard, Education Plus, or Enterprise Essentials Plus plans, you can access this potent feature.  The investigation tool allows administrators to conduct searches in different Google Workspace data sources including Gmail, Chrome, and Google… (more) Google Security Investigation Tool: Remove Users, Change Ownership, and More

7 Limitations of Google’s Security Investigation Tool & How to Solve Them

The Google Workspace Security Investigation Tool (GSIT) is an integral part of securing every data source—from Gmail to Google Drive. Introduced in 2018, the tool helps security analysts and super administrators conduct investigations and reduce risks. Although it can be a powerful tool for investigations, Google’s security tool has its limitations. In this post, we’ll address… (more) 7 Limitations of Google’s Security Investigation Tool & How to Solve Them

Google Workspace Security Investigation Tool: Guide to the Condition Builder

The Google Workspace Security Investigation Tool has become a critical piece of the security stack for companies using Google Workspace. The tool can be used with a range of Google services, from Chrome to Gmail, helping administrators and security analysts with investigations. Administrators may use the condition builder to conduct investigations and searches within the security… (more) Google Workspace Security Investigation Tool: Guide to the Condition Builder

Getting Started with the Google Workspace Security Investigation Tool

Data breaches and security threats are increasing, and so are their financial impacts. In 2023, the average global cost of a data breach was $4.45 million, according to IBM. In the United States, this figure soared to an alarming $9.48 million, surpassing all other countries. Beyond the financial aspect, data breaches result in reputational harm,… (more) Getting Started with the Google Workspace Security Investigation Tool

Every company that uses Google Workspace should be using Nira.
Bryan Wise
Bryan Wise,
Former VP of IT at GitLab

Incredible companies use Nira