Our blog
Hidden Dangers, Expensive Consequences: Evaluating the True Cost of Insider Threats
Explore the rising costs of insider threats. Discover investigation expenses, and the need for proactive measures to safeguard against internal risks.
How to Protect Sensitive Data in Documents: A Comprehensive Guide
To fortify data security within documents, employ approaches like document classification, content copy-paste controls, LeaksID invisible labels, encryption for safeguarding sensitive information.
How to Protect a Word Document: 9 Tips
Discover nine valuable tips and best practices for effectively safeguarding your documents and enhancing document security.
What is BYOD in Cyber Security: Safeguarding Against Data Breaches via Smartphone
Discover the evolving landscape of Bring Your Own Device (BYOD) policies and the risks posed by smartphone photo-based breaches.
G-71 Launches Integration With Mail Servers to Secure Email Attachments
G-71 is thrilled to announce the launch of an extensive integration of LeaksID with all major mail servers to ensure the security of sensitive email attachments.
What Function Do Insider Threat Programs Serve?
The article provides comprehensive information about insider threat programs, covering eight crucial points for their successful implementation.
Protecting Confidential Documents: The Power of Hidden Anti-Leak Marks
This article examines three vital aspects of document confidentiality: Access Control, Monitoring, and Detection, with a focus on steganography.
A Comparison of Visible Watermarks and LeaksID Anti-Leak Labels
This article compares visible watermarks with LeaksID’s anti-leak labels (fingerprints) and emphasizes the advantages of LeaksID’s undetectable labeling.
10 Unusual Insider Threat Behavioral Indicators
The article highlights the unusual data behaviors that may indicate an insider threat and suggests solutions to detect suspicious activities in organizations.
G-71 Inc. Announces Updates to LeaksID Investigation Module, Reducing Time Required to Determine Source of Confidential Document Leaks
G-71 Inc., a provider of a document security solution, announced the update of their LeaksID investigation module, which significantly reduces the time required to identify the source of a confidential document leak.
G-71 Inc. Strengthens LeaksID Solution with Email and Cloud Storage Integrations for Unmatched Confidential Document Protection
G-71 Inc.’s LeaksID solution has expanded its functionality in terms of integration capabilities, now offering integrations with email servers, One Drive and Google Drive.
The Significance of Virtual Data Rooms (VDRs) in Secure Due Diligence Processes
This article explores the importance of due diligence in business deals and the role of VDRs in facilitating effective and secure due diligence procedures.
About us
G-71 Launches Integration with Mail Servers to Secure Email Attachments
G-71 launched an extensive integration of its LeaksID solution with all major mail servers to ensure the utmost security of sensitive email attachments.
Help Net Security
Building Trust in Sensitive Document Handling: Interviewing Startups of the Year Nominee, G-71 Inc.
Read the new interview with Sergey Voynov, the CEO of G-71, as part of “Startups of the Year 2023” by Hackernoon.
HackerNoon
G-71 Inc. Announces Updates to LeaksID Investigation Module, Reducing Time Required to Determine Source of Confidential Document Leaks
G-71 Inc., a provider of a document security solution, announced the update of their LeaksID investigation module, which significantly reduces the time required to identify the source of a confidential document leak.
Digital Journal
G-71 Inc. Strengthens LeaksID Solution with Email and Cloud Storage Integrations for Documents Protection
G-71 Inc. Strengthens LeaksID Solution with Email and Cloud Storage Integrations for Documents Protection.
Digital Journal
LeaksID Awarded High Performer in Cloud File Security in G2’s Spring 2023 Report
G-71’s LeaksID is a patented ITM solution recognized by G2 as a High Performer in Cloud File Security. The G2 recognition confirms LeaksID’s credibility, reliability, and efficiency, making it an indispensable tool for businesses dealing with sensitive information.
Digital Journal
G-71 Inc.’s LeaksID: The Game-Changer in Insider Threat Management, Document Protection, and Data Leak Deterrence
Brief overview of the LeaksID solution, advantages, differences from competitors and development plans.
TECHnicalBeep
Whistleblowers Go Home? LeaksID Wants to Mitigate Insider Risks
According to Mountain View-based company G-71, in a professional environment, three leaks out of four come from people who had legal access to the document. How to cope with this?
TechAcute
How to Stop Documents Leaks: Unmask Anonymous Leakers
The article provides valuable insights and strategies for preventing data breaches caused by leaked documents and identifying anonymous leakers.
IdentityWeek
A Detailed Guide for Mitigating Insider Threats
Let’s examine how to address cybersecurity concerns regarding the prevention of internal breaches of confidential information.
HackerNoon
How Classified Information Walks Out the Door
The article examines various scenarios that can lead to this situation, including unintentional or deliberate actions by employees, as well as cyber threats and vulnerabilities.
ClearanceJobs
G-71 Inc. Launches an Early Adopter Program with Free Access to its Data Leak Deterrence Solution LeaksID 3.0
G-71 Inc. is delighted to announce the launch of a free three-month Early Adopter Program (EAP) for anyone who would like to get to know the updated data leak deterrence solution, LeaksID 3.0.
Digital Journal
Going beyond watermarks to protect sensitive documents from illegal access
Cyber threats continue to gain momentum and there are still not enough ways to counter it.
Security Boulevard