Ekran System Blog

News, opinions, and industry insights

October 24, 2017


High employee productivity is vital for your business’s success, but productivity tends to decrease over time and employees tend to require constant support to stay productive. According to a survey carried out by Webtorials, companies could be losing out on as much as $11,000 in potential annual revenue per employee because of low productivity. Though monitoring employees in...

August 15, 2017

Every organization has to deal with cyber security breaches. Large and small, public and private, commercial and non-profit – all companies have data that is crucial for their daily operations, and this data needs to be thoroughly protected.

How to build an insider threat program

Every company protects data, but some are more diligent about it than others. Some companies heavily invest in security to cover all potential vectors of attack....

July 25, 2017

A functional insider threat program is a core part of any modern cybersecurity strategy. Having controls in place to prevent, detect, and remediate insider attacks and inadvertent data leaks by your own employees or subcontractors is a necessity for any organization that strives to reliably protect its own sensitive data.

How to build an insider threat program

Many companies...

June 22, 2017

Cyber security books nowadays are a dime a dozen. The topic is so popular, that it found a reliable foothold in modern day fiction, not to mention all the books detailing exploits of real-life hackers in the past turned security experts in the present.

Top 10 cyber security books

However, if you decide to dive past the purely entertainment products, you will find a slew of IT security books for experts that are extremely useful for building protection for your own...

May 24, 2017

Probably, everyone can agree that stopping insider threats is not an easy task.  Various insider threat indicators help you to know where the potential threat is coming from, but this is only half of the battle.

Insider Threat Indicators

Before we fully dive into this topic, it is worth noting that you need much more than simply watching human behavior to identify insider threat. Reliable detection also requires a specific tools that will allow...