Our blog

A Comparison of Visible Watermarks and LeaksID Anti-Leak Labels
This article compares visible watermarks with LeaksID’s anti-leak labels (fingerprints) and emphasizes the advantages of LeaksID’s undetectable labeling.

10 Unusual Insider Threat Behavioral Indicators
The article highlights the unusual data behaviors that may indicate an insider threat and suggests solutions to detect suspicious activities in organizations.

G-71 Inc. Announces Updates to LeaksID Investigation Module, Reducing Time Required to Determine Source of Confidential Document Leaks
G-71 Inc., a provider of a document security solution, announced the update of their LeaksID investigation module, which significantly reduces the time required to identify the source of a confidential document leak.

G-71 Inc. Strengthens LeaksID Solution with Email and Cloud Storage Integrations for Unmatched Confidential Document Protection
G-71 Inc.’s LeaksID solution has expanded its functionality in terms of integration capabilities, now offering integrations with email servers, One Drive and Google Drive.

The Significance of Virtual Data Rooms (VDRs) in Secure Due Diligence Processes
This article explores the importance of due diligence in business deals and the role of VDRs in facilitating effective and secure due diligence procedures.

LeaksID Awarded High Performer in G2’s Spring 2023 Report
G-71’s LeaksID is a patented ITM solution recognized by G2 as a High Performer in Cloud File Security. The G2 recognition confirms LeaksID’s credibility, reliability, and efficiency, making it an indispensable tool for businesses dealing with sensitive information.

How to Protect Healthcare Data from Breaches and Leaks
The article discusses the importance of safeguarding sensitive patient information in the healthcare industry. It highlights the potential risks, and offers practical tips and strategies for securing healthcare data.

The Hidden Danger: Insider Threats in the Real Estate Industry
The article discusses insider threats in the real estate industry, including types of threats and real-world examples. It also provides advice on how to protect against and mitigate damage from such threats.

Preventing Insider Risks: Understanding Common Insider Threat Indicators and Effective Solutions
The article offers insights on identifying warning signs of insider threats, including employee profiles, motives, and attack methods.

13 Essential Cybersecurity Tools Every Company Should Have in 2023
In today’s digital world, cybersecurity is a crucial aspect of any business. With the rise of cyber threats and attacks, it has become essential for

Ensuring the Security of Legal Documents: Tools and Techniques
In the legal sphere, document security is of the utmost importance. Legal documents can contain sensitive information such as trade secrets, personal data, and confidential

Secure Document Sharing: Protecting Confidential Email Attachments
This article explores the importance of secure document sharing and provides examples of different types of email attachment leaks and highlights the risks involved in sharing sensitive information through email attachments.
About us

G-71 Inc. Announces Updates to LeaksID Investigation Module, Reducing Time Required to Determine Source of Confidential Document Leaks
G-71 Inc., a provider of a document security solution, announced the update of their LeaksID investigation module, which significantly reduces the time required to identify the source of a confidential document leak.
Digital Journal

G-71 Inc. Strengthens LeaksID Solution with Email and Cloud Storage Integrations for Documents Protection
G-71 Inc. Strengthens LeaksID Solution with Email and Cloud Storage Integrations for Documents Protection.
Digital Journal

LeaksID Awarded High Performer in Cloud File Security in G2’s Spring 2023 Report
G-71’s LeaksID is a patented ITM solution recognized by G2 as a High Performer in Cloud File Security. The G2 recognition confirms LeaksID’s credibility, reliability, and efficiency, making it an indispensable tool for businesses dealing with sensitive information.
Digital Journal

G-71 Inc.’s LeaksID: The Game-Changer in Insider Threat Management, Document Protection, and Data Leak Deterrence
Brief overview of the LeaksID solution, advantages, differences from competitors and development plans.
TECHnicalBeep

Whistleblowers Go Home? LeaksID Wants to Mitigate Insider Risks
According to Mountain View-based company G-71, in a professional environment, three leaks out of four come from people who had legal access to the document. How to cope with this?
TechAcute

How to Stop Documents Leaks: Unmask Anonymous Leakers
The article provides valuable insights and strategies for preventing data breaches caused by leaked documents and identifying anonymous leakers.
IdentityWeek

A Detailed Guide for Mitigating Insider Threats
Let’s examine how to address cybersecurity concerns regarding the prevention of internal breaches of confidential information.
HackerNoon

How Classified Information Walks Out the Door
The article examines various scenarios that can lead to this situation, including unintentional or deliberate actions by employees, as well as cyber threats and vulnerabilities.
ClearanceJobs

G-71 Inc. Launches an Early Adopter Program with Free Access to its Data Leak Deterrence Solution LeaksID 3.0
G-71 Inc. is delighted to announce the launch of a free three-month Early Adopter Program (EAP) for anyone who would like to get to know the updated data leak deterrence solution, LeaksID 3.0.
Digital Journal

Going beyond watermarks to protect sensitive documents from illegal access
Cyber threats continue to gain momentum and there are still not enough ways to counter it.
Security Boulevard

These are the 20 companies presenting at Alchemist Accelerator’s 26th Demo Day today
The enterprise-focused Alchemist Accelerator is hosting its 26th Demo Day today, with 20 companies expected to debut.
TechCrunch

LeaksID Announced Collaboration With Microsoft, Providing OneDrive Users Sensitive Information Protection
LeaksID, the cloud-based IT solution by G-71, announced its integration with Microsoft OneDrive for business, enabling its users to protect valuable data from leakage through screenshots and pictures of the screen, printed-out documents, and documents shared via email.
AiThority.com