Top 6 google workspace security risks and how best to address them

How to apply incident response for SaaS?
If you don’t have an incident response plan in place, then you need to create one ASAP. An incident response plan, as defined by NIST, is a “set of instructions or procedures to detect, respond to, and limit consequences of a malicious cyber attacks against an organization’s information systems.” Basically, your incident response plan is […]

Is your data secure on Microsoft Teams?
Microsoft Teams has fast become a staple in the modern workplace. Each day, more than 145 million people use it for business communications. In a world where people are rarely in the office five days a week, Team facilitates the rapid communication and data sharing that employees need today. However, while communicating is certainly easy […]

Why Google Drive’s native DLP isn’t enough
Today, more than five million businesses pay to use Google Workspace. Even if your business is a Microsoft Office lover, there’s a high probability that at least some of your employees use tools like Google Docs and Google Sheets–whether you know about it or not! It’s easy to see why people love Google Drive and […]

What is NIST framework?
The technology industry is still technically in its infancy. Every year, it seems that innovation hurls forwards in leaps and bounds. At the same time, the cyber security risks that organizations face are constantly evolving too. Because everything is, well, so new, there’s a lack of standards and rules out there for mitigating cyber risk – […]

How is HIPAA being upgraded for remote work?
It’s been a long time since there’s been any update to the Health Insurance Portability and Accountability Act (HIPAA). But, this year, things are going to change with new additions to the HIPAA privacy rule expected to be announced in the coming months. Read on to discover how HIPAA will evolve this year and what […]

How to secure identity and access management
Verizon’s Data Breach Investigations Report found that stolen credentials were the top causes of data breaches for the fourth year in a row. In our hyper-connected, primarily remote, SaaS-dominated working world, email addresses and passwords are the lock and keys of employee productivity. Unfortunately, though, if hackers get their hands on these details, they could steal a […]

How does business email compromise (BEC) occur?
These days, everyone’s heard of ransomware. It’s touted as the most threatening form of cybercrime out there. But, actually, it’s not. The FBI’s annual cybercrime report found that Business Email Compromise (BEC) attacks account for losses that are a massive 64 times worse than ransomware. While ransomware contributed $29 million in losses, BEC caused over […]

5 ways cloud DLP helps secure PHI
The healthcare sector has a problem. It’s trying to innovate, embrace new ways of working and adopt the cloud. To an extent, it’s doing this successfully but, then, when we look at data breach figures we see that, for many companies, this innovation is coming at a cost. For the last ten years, the healthcare […]

Data security challenges posed by Slack & Teams for financial services
As the financial services (FS) sector embraces new ways of working and digital transformation, communication tools like Slack and Teams are helping employees to find new efficiencies and better collaborate with partners, customers and clients. Platforms like Slack and Teams are highly versatile–and they are constantly adding new functionality that makes them more appealing to […]

How to secure data in your SaaS-based collaboration tools
Introduction *News flash*. Your cloud applications are a massive data security risk. We’re not saying don’t use cloud apps, but we are saying: invest in securing them properly. Otherwise, you risk the fallout of a data breach and hefty compliance fine. Here’s everything you need to know about SaaS apps and data security. What’s a […]