Ekran System Blog

News, opinions, and industry insights

April 11, 2019

In the modern world, almost every company is exposed to insider threats in the form of either deliberate attacks or accidental data leaks. In any case, it’s best to get ready before all hell breaks loose. A risk mitigation plan for an insider attack prepares you for this situation and helps you reduce the damage.

 

In this article, we discuss risk mitigation plans – what they are, their purpose, their key elements – and best practices for insider threat protection.

 

What is a risk mitigation plan?...
Category:
April 04, 2019

When we think of data misuse, the first thing that comes to mind is a movie where police officers use police databases to make personal requests for information. In movies, they use this information to do their job: stop the bad guy and save the day. In real life, such data is often used in pursuit of a less noble cause. For example, between 2013 and 2015, US police officers violated data security rules 325 times in order to get information on their families, friends, neighbors, business associates, and others.

 

In business, data misuse may lead to a very...

Category:
March 26, 2019

Multiple surveys show that people don’t take the security of their login credentials and personal devices seriously enough. According to a survey by Intermedia, nearly 50 percent of respondents admitted sharing their logins with multiple users. In a second survey, conducted by B2B International and Kaspersky Lab, over 30 percent of respondents said they don’t take any precautions for protecting their personal data when sharing internet-enabled devices with relatives, friends, and colleagues.

 

These findings make us wonder whether it’s enough to...

Category:
March 12, 2019

More than 446 million records were leaked during 2018, according to the 2018 End-of-Year Data Breach Report by the Identity Theft Resource Center. If you’ve been waiting for a sign to start enhancing your data security, here it is. Choosing a reliable monitoring solution is half the battle. But first, you’ll have to figure out the pros and cons of the major types of security systems.

 

Active data leak protection (DLP) and passive monitoring are two classic and trusted approaches to data protection. The debate between users of both methods has...

Category:
February 21, 2019

The number of cyber attacks and data breaches is increasing with every passing day, but security teams are often not ready to detect all security gaps in their organizations. The scope of their monitoring is usually so broad that it’s difficult to anticipate where a potential threat might come from.

 

However, identifying security gaps is easier if the security team can understand the logic of adversaries. Fortunately, the MITRE ATT&CK framework provides a comprehensive approach to better detect and mitigate adversarial behavior.

 

The MITRE...
Category:

Pages