G-71 Inc. Announces Updates to LeaksID Investigation Module, Reducing Time Required to Determine Source of Confidential Document Leaks

G-71 Inc., a provider of a document security solution, announced the update of their LeaksID investigation module, which significantly reduces the time required to identify the source of a confidential document leak.

According to open-source data, conducting an investigation to determine the source of a leak is often the most time-consuming and expensive part of addressing the aftermath of a leak. It can be challenging to identify who compromised a document, whether it was through taking a photo of a confidential document with a smartphone or sneaking out a printed copy of the document from an office.

Existing solutions on the market help prevent and investigate leaks but fall short when it comes to compromising analog versions, such as printed copies of documents, or leaked photos on mobile devices. This is where LeaksID can help. The solution incorporates invisible marking into documents at every stage of interaction with them, such as printing, sending, downloading, and even viewing. In the event of a leak, this marking can easily identify the source of the leak.

 

We are constantly improving our solution and optimizing it to meet the needs of our users. Improving the speed of investigation is an opportunity to reduce even more time for our users and obtain more accurate results.

The latest updates to the LeaksID investigation module include faster document recognition, improved calibration, and enhanced accuracy of investigation results. To initiate a new investigation, users simply need to upload a fragment of the leaked document using the drag and drop tool, such as a photo, screenshot, or small snippet with just a few sentences in .png, .jpg, or .tiff format.

There’s no need to provide the entire document for an investigation. LeaksID’s system then compares the sample with copies in its database and searches for matching documents. Additionally, the built-in image editor allows users to pre-process the document sample if necessary. Overall, the investigation process is designed to be straightforward and user-friendly.

Investigations are one of our key features. While watermarking is widely available, it does not provide the necessary support for further investigation. That’s why we focus on our module and offer a unique approach to document investigation.

About G-71

G-71 Inc., a cybersecurity company, created a cutting-edge ITM technology LeaksID to solve a crucial problem enterprises face: leaks and public disclosure of sensitive documents that are compromised via various methods, including photographs.

You may also find this interesting

LeaksID Awarded High Performer in G2’s Spring 2023 Report

G-71’s LeaksID is a patented ITM solution recognized by G2 as a High Performer in Cloud File Security. The G2 recognition confirms LeaksID’s credibility, reliability, and efficiency, making it an indispensable tool for businesses dealing with sensitive information.

How to Protect Healthcare Data from Breaches and Leaks

The article discusses the importance of safeguarding sensitive patient information in the healthcare industry. It highlights the potential risks, and offers practical tips and strategies for securing healthcare data.

Data and Document Leak Investigation

If you suspect that your company has suffered a data leak, it’s important to investigate the situation immediately so that you can take action and mitigate any potential damage.

How Classified Information Walks Out the Door

The article examines various scenarios that can lead to this situation, including unintentional or deliberate actions by employees, as well as cyber threats and vulnerabilities.

ClearanceJobs

What is an Insider Threat?

How can companies counter insider threat? What types of insider leaks exist? How to reduce insider risk with invisible labeling?

Confidential Data Leaks: Who Steals and Why?

The motives for hacking, especially virtual hacking through penetration into the secret infrastructure of a company, are very diverse, as are the methods used for such purposes. Here are some examples of the most common reasons for theft.