LeaksID Integration with Google Drive: Full Guide on How It Works

Google Drive integration is now available for all LeaksID users. It protects sensitive data in popular online storage from insider threats. Here is an overview of how it works.

Google Drive is one of the most prominent and widely used cloud platforms for document storage. Easy to learn but sophisticated system is highly trusted by numerous users and companies around the world. One of the most practical Google Drive features is the ability to provide file access using direct links.

However, while sharing links, the sensitive information is not protected from insider leakage. Suppose one of the users with granted file access wants to transfer it outside of a company. There are several ways to do it: link sharing, file download, a screenshot, or a picture of the screen with the information on it taken with a smartphone. In all these cases, the culprit stays undiscovered and unpunished, which means that it can happen again with other documents in the future.

To minimize the insider threat and deter a potential violator, we have developed LeaksID technology that can now be successfully integrated with Google Drive.

How LeaksID and Google Drive work together

When the user with preinstalled LeaksID application right-clicks on a Google Drive document that needs to be shared, an option “Open with LeaksID” appears. After clicking on it, the user shall see a personalized protected copy in the automatically generated account on LeaksID (the original file remains on Google Drive).

Inside LeaksID, the owner of the document can grant different access rights to other users. However, all of them will interact not with the original file but with a personalized copy marked with the unique tags. These tags don’t interfere with the document workflow. They are invisible to a human eye and easily recognized by the system. Using these markers, the system can accurately identify who and when worked with a particular copy, and if a data breach occurs, it can determine the source.

A small fragment of even a damaged file is enough for a successful investigation. Due to the US-patented marking technology, the system can correctly identify the culprit from screenshots or pictures of the screen, and it was impossible before.

Who it is useful to

First of all, the integration with a popular file hosting service is efficient for company employees. With LeaksID, they don’t have to spend time retraining since they already know how to work with a familiar and comprehensible Google interface. This system will be especially helpful for law firms, companies involved in M&A deals, the healthcare sector, and screenwriters, as well as for other niche markets and government agencies. In these industries, any information leak threatens with multimillion losses and enormous reputational damage.

For example, let us recall the scandal with Mossack Fonseca, a major provider of offshore companies; its documents were leaked to the media in 2016. It turned out that among their users were leaders of 29 countries and billionaires from the Forbes list. After such a devastating blow to its reputation, the law firm could not recover and two years later announced its closure. Their clients also got compromised: after the publication of the documents, more than 150 investigations in 79 countries were opened on the facts of tax evasion and money laundering.

Most likely that if those who organized the data leak knew that they would be identified and discovered, they would abandon the whole idea. This is one of the key advantages of LeaksID: all users are aware that important information is protected by a solution that, in case of a leak, will identify its culprit. As a result, a culture of working with sensitive data based on a preventive effect is created: in organizations using LeaksID, the chance of leakage is minimized.

Leaks ID is now compatible with Google Docs, Sheets, and Slides. To learn more about LeaksID features for Google Drive, click here.

Stay tuned!

Try out LeaksID, our cloud solution to store documents, collaborate on them, and securely share them.

You may also find this interesting

LeaksID Awarded High Performer in G2’s Spring 2023 Report

G-71’s LeaksID is a patented ITM solution recognized by G2 as a High Performer in Cloud File Security. The G2 recognition confirms LeaksID’s credibility, reliability, and efficiency, making it an indispensable tool for businesses dealing with sensitive information.

How to Protect Healthcare Data from Breaches and Leaks

The article discusses the importance of safeguarding sensitive patient information in the healthcare industry. It highlights the potential risks, and offers practical tips and strategies for securing healthcare data.

Data and Document Leak Investigation

If you suspect that your company has suffered a data leak, it’s important to investigate the situation immediately so that you can take action and mitigate any potential damage.

How Classified Information Walks Out the Door

The article examines various scenarios that can lead to this situation, including unintentional or deliberate actions by employees, as well as cyber threats and vulnerabilities.


What is an Insider Threat?

How can companies counter insider threat? What types of insider leaks exist? How to reduce insider risk with invisible labeling?

Confidential Data Leaks: Who Steals and Why?

The motives for hacking, especially virtual hacking through penetration into the secret infrastructure of a company, are very diverse, as are the methods used for such purposes. Here are some examples of the most common reasons for theft.