Do you know who has access?
Security goes beyond a strong password. We check your environment on three essential pillars: Email (Gmail), Data (Drive), and General Security. Organizations are often shocked by how many files are shared publicly or how many external apps have access to company data.
Gmail Security
Prevent CEO fraud and spoofing. We check SPF, DKIM, DMARC, and anti-phishing settings to ensure your email is secure.
Drive & Sharing
Who shares what with whom? We map out which files are externally accessible and advise on sharing policies.
General Security
From 2-step verification (2FA) policies to managing API access by third-party apps (Marketplace apps).
What is the deliverable?
You receive a clear report with a "traffic light" system (Red/Orange/Green). No technical jargon, but concrete action items to immediately improve your security.
Risks in Practice
The "Public" Payslip
In 30% of audits, we find sensitive HR documents accidentally shared "public on the web" via a link. A nightmare for any GDPR officer.
The Invisible Admin
An ex-employee who still has access, or a malicious plugin allowed to read all your email. We detect these invisible risks and lock the doors.
Frequently Asked Questions
No, for the audit we look at settings (metadata) and configurations, not the content of emails or files.
On average, the scan and analysis take half a day. Writing the report and presentation follows in the days after.
The audit is an analysis. Of course, we can fix the found issues for you afterwards, but this is a follow-up project.
GDPR requires you to take "appropriate technical measures". A periodic audit demonstrates that you take this seriously.
The price depends on the size of the environment (number of users). Contact us for a tailored quote.
Is your data safe?
Hi, I'm Patrick. Let me take a look under the hood. Better safe than sorry.
Request a Security Audit