What could companies that suffered have done better, and how can automation help mitigate the results of similar events in the future? Table of Contents CrowdStrike Incident: What Do We Know About It CrowdStrike Holdings, Inc. is an American cybersecurity technology company based in Austin, Texas. It provides cloud workload protection and endpoint security, threat …
Read moreLearn what steps the IT department has to perform to avoid being blamed for information leaks and ensure departing employees have no access to company’s data anymore. Why Following An Employee Offboarding Checklist Employee offboarding is a critical process that demands mutual contribution from both HR and IT teams. For HR professionals, this might include …
Read moreFind out who changed file permissions in time and take necessary actions — Google Workspace security automation guide. Google Workspace is an exceptionally safe environment — many IT Directors choose Google Workspace for this very reason. It offers robust data security features and invests a lot to keep your data 100% safe in the cloud. …
Read moreA step-by-step guide on the easiest way to perform several most repetitive and common Google Workspace admin tasks, from how to add a user to Google account to advanced SCIM provisioning and more. Managing Google Workspace can be a daunting task for administrators. With a myriad of responsibilities ranging from user onboarding to license management, …
Read moreA step-by-step guide on how to build an end-to-end automated process of external files sharing audits, including user notifications and tasks assignments. A detailed video tutorial below. Table of Contents Why Perform Audits? Google Drive is an incredible tool for document creation and sharing. Its simplicity, however, can lead to potential data sprawl, making it …
Read moreDiscover how to optimize your workflow by automating the process of saving and uploading attachments from your incoming Gmail emails on Google Drive for further use. Table of Contents One of the most common tasks for anyone in IT, Marketing, HR or Legal Department is going through attachments they receive through their email and saving …
Read moreDiscover the best backup solutions for Google Workspace users in 2024. This comprehensive guide explores top providers, their features, pricing, and user reviews to help you safeguard your critical business data. Table of Contents Our selection process In selecting the top 10 backup solutions for Google Workspace users in 2024, we employed a rigorous evaluation …
Read moreLearn if SMEs are vulnerable to cyberattacks, what are the most common reasons for the successful attacks, and how likely are you to face a ransom. In a recent webinar hosted by Zenphi, the #1 tool for Google admins, Andy Sommer, a renown expert in cybersecurity and the founder of The Sommer Agency, shed light …
Read moreHow to conduct detailed automated audits of files shared externally, ensuring that their data remains secure. Video tutorial below! Knowing who and when used information stored on shared drives and shared it with some external users is crucial for any organization’s data loss prevention strategy. As users create more and more files, more and more …
Read moreHow overlooking “zombie drives” can breach your Google Workspace security, and how to manage them properly within your Google DLP strategy. Table of Contents What Are “Zombie Drives” “Zombie” drives, often referred to in the context of Google Workspace and similar platforms, are Shared Drives (formerly known as Team Drives) that no longer have any …
Read moreRecent Posts
- The Complete Guide to Workflow In Human Resources: Tasks to Automate and Tasks for HR to Handle
- Approval Workflows: How To Automate Vendor Onboarding
- Customer Proposal Approval Workflow
- User Access Management Best Practices: How to Prevent Unauthorized Access In Google Workspace
- Zero Trust & Google: A Guide To Overcoming Challenges
Categories
- Approval Workflows(12)
- Education Use Cases(12)
- Finance Use Cases(17)
- General(60)
- Google Drive(12)
- Google Sheets(6)
- How-To(61)
- HR Use Cases(23)
- Industry(2)
- Integrated AI Usage(23)
- Intelligent Document Processing(13)
- IT Use Cases(56)
- Legal Use Cases(11)
- Marketing Use Cases(8)
- Product Updates(16)
- Sales Use Cases(13)
- Use case(3)
- zenphi Use Cases(110)