Varonis announces strategic partnership with Microsoft to accelerate the secure adoption of Copilot.

Learn more

Threat Update 48 - Using Google to Spot Exposed Data in the Cloud

Cloud data stores like Box and Google Workspace make sharing and collaborating easy and convenient. However, there can be hidden risks.
Kilian Englert
1 min read
Last updated January 17, 2023

Cloud data stores like Box and Google Workspace make sharing and collaborating easy and convenient. However, there can be hidden risks. Configuration settings for these services can be complex – and if you’re not careful, you could open external collaboration to just about anyone. Now imagine if that document you’re sharing contains sensitive data on your business, your employees, or your customers. There are legitimate uses for sharing documents outside of the organization on the public internet, but you can open yourself up to a ton of risk if sensitive data is accidentally exposed.

Join Kilian Englert and Ryan O’Boyle from the Varonis Cloud Architecture team as they share a quick and easy Google search string that can help you verify your public document exposure with Box, as well as some tips on how your organization can proactively spot these risks.

👋 To learn how else we can help, please visit us at: https://www.varonis.com/help/

What you should do now

Below are three ways we can help you begin your journey to reducing data risk at your company:

  1. Schedule a demo session with us, where we can show you around, answer your questions, and help you see if Varonis is right for you.
  2. Download our free report and learn the risks associated with SaaS data exposure.
  3. Share this blog post with someone you know who'd enjoy reading it. Share it with them via email, LinkedIn, Reddit, or Facebook.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.

Keep reading

Varonis tackles hundreds of use cases, making it the ultimate platform to stop data breaches and ensure compliance.

threat-update-42-–-hidden-costs-of-a-breach
Threat Update 42 – Hidden Costs of a Breach
The American Accounting Association performed a study on how data breaches impact businesses beyond the immediate costs of recovery and brand damage.
threat-update-23---bypassing-endpoint-controls-using-office-macros
Threat Update 23 - Bypassing Endpoint Controls Using Office Macros
So many attacks start with a simple booby-trapped document that runs malicious code. Crafty attackers can even customize the payload to bypass endpoint controls! Don’t believe us? Check out this...
threat-update-69---what-is-secure-access-service-edge-(sase)?
Threat Update 69 - What is Secure Access Service Edge (SASE)?
Kilian and Ryan O'Boyle from the Varonis Cloud Architecture team cover what Secure Access Service Edge (SASE) is all about, and dive into other security considerations organizations should keep in mind when looking to "decentralize" their network architecture.
threat-update-18-–-sanctions-for-ransomware-payments
Threat Update 18 – Sanctions for Ransomware Payments
Would you consider coughing up the bitcoins if you got hit with ransomware? Better think again, you could potentially end up in more trouble! Click to watch Kilian Englert and...