Ekran System Blog

News, opinions, and industry insights

August 10, 2022

Your organization might leverage cloud computing because of its practical advantages: flexibility, rapid deployment, cost efficiency, scalability, and storage capacity. But do you put enough effort into ensuring the cybersecurity of your cloud infrastructure? 

 

You should, as data breaches and leaks, intellectual property theft, and compromise of trade secrets are still possible in the cloud. Cybersecurity risks in a complex cloud environment may make it hard to protect your data and comply with IT requirements of many standards, laws, and regulations.

...

Category:
July 27, 2022

Traditional identity and access management (IAM) implementation methods can’t provide enough flexibility, responsiveness, and efficiency. Indeed, many organizations struggle with developing a mature IAM program according to the State of Enterprise Identity report by the Ponemon Institute. Among the key reasons for this challenge cited by respondents in the report are a lack of employee awareness, an insufficient budget, and ineffective planning. At the same time, the cybersecurity environment is actively changing due to factors such as the COVID-19 pandemic, geopolitical disturbances...

Category:
July 20, 2022

Financial data is a desired target for cybercriminals. Hackers frequently attack financial institutions such as banks, loan services, investment and credit unions, and brokerage firms. Security incidents in the financial sector are extremely expensive (surpassed only by the healthcare industry), with the average total cost of a data breach reaching $5.72 million in 2021.

 

For efficient data security in the banking industry, you need to ensure proper compliance with banking cybersecurity standards, laws, and regulations, both local and international. In this article,...

Category:
July 06, 2022

In today’s complex and interdependent world, it’s incredibly difficult to deliver a product or service without a supply chain. But this dependency creates additional risks – from reputational losses to major business disruptions. And with 62% of organizations being impacted by supply chain cyberattacks in 2021, mitigating risks created by third parties is extremely important.

 

What supply chain risks might your organization experience? What particular threats are there? How can you protect your supply chain from possible attacks? Read this blog post...

Category:
June 15, 2022

System administrators hold the keys to your organization’s cybersecurity. However, their accounts can also be a source of cybersecurity risks to your company. Both cybercriminals and malicious administrators can exploit the elevated privileges for their own benefit.

 

In this article, we explore key risks coming from admin accounts and offer seven effective practices you can adopt to secure administrative access to your organization’s critical systems and data.

 

Why system administrators deserve special attention

 

Keys...

Category:

Pages