Ekran System Blog

News, opinions, and industry insights

August 17, 2022

Establishing proper privileged account management procedures is an essential part of insider risk protection. There are some common mistakes companies make when managing accounts of privileged users.


In this article, we overview eight widespread poor account management practices, analyze their consequences, and discuss ways to improve them. We also take a look at Ekran System’s account management capabilities that you can benefit from.


1. Approving all access requests manually


Manual access approval is widely used in small...

August 10, 2022

Your organization might leverage cloud computing because of its practical advantages: flexibility, rapid deployment, cost efficiency, scalability, and storage capacity. But do you put enough effort into ensuring the cybersecurity of your cloud infrastructure? 


You should, as data breaches and leaks, intellectual property theft, and compromise of trade secrets are still possible in the cloud. Cybersecurity risks in a complex cloud environment may make it hard to protect your data and comply with IT requirements of many standards, laws, and regulations.


July 27, 2022

Traditional identity and access management (IAM) implementation methods can’t provide enough flexibility, responsiveness, and efficiency. Indeed, many organizations struggle with developing a mature IAM program according to the State of Enterprise Identity report by the Ponemon Institute. Among the key reasons for this challenge cited by respondents in the report are a lack of employee awareness, an insufficient budget, and ineffective planning. At the same time, the cybersecurity environment is actively changing due to factors such as the COVID-19 pandemic, geopolitical disturbances...

July 20, 2022

Financial data is a desired target for cybercriminals. Hackers frequently attack financial institutions such as banks, loan services, investment and credit unions, and brokerage firms. Security incidents in the financial sector are extremely expensive (surpassed only by the healthcare industry), with the average total cost of a data breach reaching $5.72 million in 2021.


For efficient data security in the banking industry, you need to ensure proper compliance with banking cybersecurity standards, laws, and regulations, both local and international. In this article,...

July 06, 2022

In today’s complex and interdependent world, it’s incredibly difficult to deliver a product or service without a supply chain. But this dependency creates additional risks – from reputational losses to major business disruptions. And with 62% of organizations being impacted by supply chain cyberattacks in 2021, mitigating risks created by third parties is extremely important.


What supply chain risks might your organization experience? What particular threats are there? How can you protect your supply chain from possible attacks? Read this blog post...