July has been a busy month over at Metomic. We've introduced new features that enable Metomic users to discover stale data in their Google Drive with our 'Last Accessed' feature.
July has been a busy month over at Metomic. We've introduced new features that enable Metomic users to discover stale data in their Google Drive with our 'Last Accessed' feature.
We've also added notes to assets so security teams can better understand how employees are using sensitive data in files, documents, and messages. Read on to learn more about this exciting new feature.
Our 'Last Accessed' feature gives Metomic users the ability to filter Google Drive assets based on the last time they were accessed, enabling data security teams to see files that have been left untouched for longer periods.
While Google Drive can be a powerful tool for collaboration, data can linger longer than it's needed, widening an organisation's attack surface. This feature helps customers uncover stale assets, so they can take action to minimise risks within their Google Drive environment. Please note: Customers will be able to see this data, from the date the feature is turned on.
Watch this video to see how it works:
Metomic users can now ‘add a note’ that is stored alongside the asset in the action history. This gives customers the option to send authors (employees) a note, with a custom label.
This feature enhances your human firewall by enabling employees to respond to questions with free text, which can be pushed as admin alerts or kept for security engineers to review and triage. As we know, security engineers rarely want to take destructive or disruptive action without interrogating the asset first.
Watch this video to see it in action:
IBM's breach report highlights an average cost of nearly $5 million per data breach, a stark warning for the increasingly targeted healthcare sector.
The steep financial impact emphasises the necessity for organisations to adopt advanced, AI-powered security measures. Traditional defences are no longer sufficient against sophisticated cyber threats. Investing in proactive security protocols, comprehensive incident response plans, and regular vulnerability assessments is crucial.
As breaches become more costly and complex, the focus must shift towards comprehensive data protection strategies to prevent financial and reputational damage.