Ekran System Blog

News, opinions, and industry insights

July 28, 2020

Privileged access rights are the gateway to critical systems and data. Providing users with elevated privileges is a standard practice, as employees sometimes need access to sensitive data to perform their jobs. At the same time, there’s always a risk of privilege misuse with the aim of industrial espionage or cyberattacks.

 

In this article, we explain why elevated privileges can pose a threat to your organization’s cybersecurity, how privilege escalation works, and what risks are hidden behind uncontrolled privilege escalation. We then offer a list of...

Category:
July 08, 2020

Data is money and power. And the more valuable the data, the greater the power it provides. This is why financial institutions such as banks, loan services, investment and credit unions, and brokerage firms have always been targeted by cybercriminals. Unfortunately, the financial sector was the industry that suffered the second most data breaches in 2019, surpassed only by the healthcare industry.

 

One way to enhance data protection in the banking sector is by ensuring proper financial data security compliance with industry standards, international laws, and local...

Category:
June 17, 2020

Privileged users are an essential part of any organization. They know all the biggest company secrets and have access to the most vulnerable parts of the corporate network. At the same time, the 2019 Verizon Data Breach Investigations Report [PDF] names privilege abuse as the leading cause of data breaches within the category of misuse. The more privileges are assigned to a user, the closer they should be monitored.

 

Furthermore, privileged user monitoring (PUM) is a requirement of multiple laws, regulations, and standards including PCI DSS, SOX, NIST 800-53, and...

Category:
June 02, 2020

High employee productivity is vital for your business’s success. Yet only 34% of US employees are engaged with their work (and 13% are actively disengaged) according to a 2018 poll by Gallup. But the productivity of even the most engaged employees tends to decrease over time. Workers require constant support to stay productive. This is especially important when dealing with remote employees, as they aren’t within their manager’s eyesight and have lots of domestic distractions.

 

User activity monitoring (UAM) is a common solution for issues with...

Category:
May 18, 2020

Monitoring employees is one way to ensure a productive and secure workflow within an organization. However, not all employees like being watched. Some even challenge the ethics and legality of workplace surveillance.

 

In this article, we explore the nature of workplace surveillance and consider the laws US employers should know and follow if they want to monitor their employees. We also look closely at an important part of workplace surveillance — employee monitoring — and provide you with six employee monitoring recommendations.

Workplace...
Category:

Pages