Ekran System Blog

News, opinions, and industry insights

July 28, 2021

For any organization, insider attacks are like a severe illness: prevention is better than the cure. Like illnesses, insiders mask their malicious actions and can harm your organization for a long time before you detect them. This harm can be in the form of a loss of data, customers, money, etc.


Planning a risk mitigation process helps to stop insider attacks at the early stages or reduce their potential damage. In this article, we discuss how to mitigate insider threats, why it’s worth doing, what the key steps are in this process, and how Ekran System can...

July 07, 2021

Securing an organization’s sensitive data is hard, especially when the danger comes from within. A careless coworker may insecurely share credentials, an intruder may compromise an account, or a malicious insider may misuse their access rights. According to the 2020 Cost of Insider Threats Report [PDF] by IBM, 60% of organizations experienced more than 20 insider-related incidents in 2019.


One promising solution to prevent insider threats is user and entity behavior analytics (UEBA). Introducing a UEBA mechanism to your cybersecurity program can help you detect...

June 23, 2021

While organizations are spending a good deal of money protecting their data against unauthorized access from the outside, malicious insiders may pose no less harm. According to the 2021 Data Breach Investigation Report [PDF] by Verizon, 36% of all data breaches experienced by large organizations in 2020 were caused by internal actors. For small and midsize businesses, it was 44%.


Organizations that become victims of malicious insider attacks face many negative consequences: from loss of confidential data, revenue, and clients to reputational harm or even going out of...

June 04, 2021

Whether intentionally or not, insiders are often behind massive cybersecurity incidents. According to Forrester, data breaches caused by insiders will account for 33% of all cybersecurity incidents in 2021. The good news is that you can learn how to effectively prevent devastating cybersecurity incidents from the experience of other organizations.


In this article, we review ten large cybersecurity incident examples from the past few years that affected world-known organizations:





Trend Micro...

May 18, 2021

Original ideas, developments, and trade secrets help businesses increase their value and stand out among competitors. But as market competition grows, the risks of intellectual property (IP) theft and leaks also grow. Establishing basic security policies and procedures to protect sensitive data is crucial if you want to continue to benefit from your intellectual property.


In this article, we dig into the importance of intellectual property protection and explore possible scenarios of intellectual property theft. We also offer seven best practices to help you secure...