5

Threat Update 48 - Using Google to Spot Exposed Data in the Cloud

 3 years ago
source link: https://www.varonis.com/blog/threat-update-48-using-google-to-spot-exposed-data-in-the-cloud/
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.
neoserver,ios ssh client

Threat Update 48 – Using Google to Spot Exposed Data in the Cloud

Data Security

Inside Out Security Blog » Data Security » Threat Update 48 – Using Google to Spot Exposed Data in the Cloud

Kilian Englert

Kilian Englert

Updated: 7/23/2021

Cloud data stores like Box and Google Workspace make sharing and collaborating easy and convenient. However, there can be hidden risks. Configuration settings for these services can be complex – and if you’re not careful, you could open external collaboration to just about anyone. Now imagine if that document you’re sharing contains sensitive data on your business, your employees, or your customers. There are legitimate uses for sharing documents outside of the organization on the public internet, but you can open yourself up to a ton of risk if sensitive data is accidentally exposed.

Join Kilian Englert and Ryan O’Boyle from the Varonis Cloud Architecture team as they share a quick and easy Google search string that can help you verify your public document exposure with Box, as well as some tips on how your organization can proactively spot these risks.

👋 To learn how else we can help, please visit us at: https://www.varonis.com/help/

Kilian Englert

Kilian Englert

Kilian has a background in enterprise security engineering, as well as security solution selling. Kilian is a Certified Information Systems Security Professional (CISSP) and creates internal and public content on topics related to cyber security and technology best practices.


About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK