Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

LeaksID Announced Collaboration With Microsoft, Providing OneDrive Users Sensitive Information Protection

LeaksID, the cloud-based IT solution by G-71, announced its integration with Microsoft OneDrive for business, enabling its users to protect valuable data from leakage through screenshots and pictures of the screen, printed-out documents, and documents shared via email.

OneDrive for business is an important part of Microsoft products’ ecosystem. Its users can access, share, and collaborate on the files from anywhere. However, while sharing links, sensitive information is not protected from leakage. A user with granted file access and malicious intentions can leak information in several ways: by making a copy of a file, making a screenshot, or taking a picture of the screen with a smartphone. This is why according to the Insider Threat Report, over the past few years, the number of screenshots, photos of the screen, and printouts containing sensitive information leaked online has increased by 10%. 

Recommended AI News: Plannuh Announces AI-Driven Marketing Planning and Budgeting Platform Integration to Salesforce

Related Posts
1 of 30,281

LeaksID helps to deter malicious users from leaking valuable data. It uses its patented algorithm that logs every file in an invisible way to the human eye. The end-user receives a unique copy of the document every time the document is opened, emailed, or printed out. These marks are impossible to remove. In this manner, every person who works with the document knows that if data breaches occur, whoever is responsible for them will be identified, even if the size of the leaked fragment is extremely small. 

Recommended AI News: Claro Enterprise Solutions Launches IoT-Enabled RTLS+ Solutions

“The development of technologies that make the exchange of information between users more convenient carry not only benefits but also threats, as the number of ways for leakage increases. When all the users that have granted access to the data know and accept that the files are protected by a technical solution that reliably identifies the source in case of a leak, the chance of leak becomes virtually non-existent,” – said G-71’s CEO Sergey Voynov

Recommended AI News: Ingram Micro Commerce & Lifecycle Services Adds Shipwire Logistics Platform To Sweden Warehouse

Comments are closed.