archTIS
  • Products
    • Kojensi
    • Spirion
      • Sensitive Data Platform
      • Sensitive Data Finder
      • Sensitive Data Watcher
      • Sensitive Data Manager
    • NC Protect
      • NC Protect Overview
      • NC Protect for Microsoft 365
      • NC Protect for SharePoint On-premises
      • NC Protect for File Shares
      • NC Protect for Nutanix Files
      • NC Protect for NetApp ONTAP
      • NC Encrypt
      • Data Connector for Microsoft Sentinel
      • NC Protect for Government & Defense
      • NC Protect Integrations
    • Trusted Data Integration
      • Security Policy Orchestration
      • Service Orchestration
  • Solutions
    • Kojensi Use Cases
      • Government
      • Australian Defence DISP/PSPF/ISM
      • US Defense ITAR/Export Controls
      • Intelligence
      • Multinational Coalition
      • Critical Infrastructure (SLACIP)
      • Universities
    • NC Protect Use Cases
      • Audit and Track Sensitive Data Access
      • CMMC & NIST Compliance
      • Dynamic Watermarks
      • Manage Guest Access
      • Information Barriers
      • ITAR & EAR Compliance
      • Policy-based Data Encryption
      • Privacy Compliance
      • Multi-label Classification for M365
      • Restrict File Access
      • Secure File Sharing in Microsoft Teams
    • TDI USE CASES
      • Security Policy Orchestration
      • Service Orchestration
  • Resources
    • Blog
    • Events
    • Resource Center
    • What is ABAC?
  • Support & Services
    • Support
    • Premium Support
    • Services
  • Company
    • About archTIS
    • Board of Directors
    • Executive Team
    • Careers
    • Newsroom
      • Press Releases
      • Media Coverage
    • Partners
  • Investor
  • Contact
Select Page
3 File Share Security Flaws Putting Sensitive Data at Risk

3 File Share Security Flaws Putting Sensitive Data at Risk

by Irena Mroz | Nov 12, 2020 | Blog

Hackers Don’t Break In, They Login Security threats have evolved quickly in the age of digital transformation. It’s no longer just hackers we have to worry about, but bad actors with stolen user credentials and even our employees who have access to vast amounts of now...

Subscribe Now

Latest Blogs

  • AI Guardrails – DSPM Enters a New Era of Control and Visibility
  • Data Security in Collaborative Environments: Why Data Discovery and Protection Matter
  • FERPA Compliance in Higher Education: Controlling Access to Student Data
  • Controlled Unclassified Information (CUI) Marking Requirements & Management in M365 & GCC High

Latest Press Releases

  • Latest Release of archTIS’ NC Protect for M365 Introduces New Integrations with Microsoft Teams and ISEC7
  • archTIS Unveils the Next Generation of NC Protect for Microsoft 365
  • archTIS Acquires U.S. Data Security Firm Spirion to Accelerate Global Expansion and Expand Data-Centric Security Offering
  • archTIS Named a 2025 Australian Defence Industry Awards Finalist for Cyber Business of the Year
  • Follow
  • Follow
  • Follow
  • Follow

© 2026 archTIS Limited

Products & Services

  • Kojensi
  • NC Protect
  • NC Encrypt
  • Spirion
  • Trusted Data Integration
  • Services
  • Support

Resources

  • Attribute Based Access Control
  • Blog
  • Events
  • Media Coverage
  • Press Releases
  • Resources

Company

  • About archTIS
  • Executive Team
  • Board of Directors
  • Our Partners
  • Careers
  • Privacy Policy

Contact

Contact Us

Investor Relations