Ekran System Blog

News, opinions, and industry insights

April 13, 2020

People tend to trust those they work with: employees, business partners, subcontractors. But these people, who have access to all kinds of corporate data, don’t always prove worthy of such trust. Insider data theft statistics show that one in four employees won’t think twice before stealing sensitive data from their current company if it will help them sign a contract with a competitor. And according to Verizon’s 2019 Data Breach Investigation Report, 34% of data breaches in 2018 were caused by insiders.


In this article, we investigate the problem...

March 31, 2020

With the number of insider-related breaches rising every year, employee monitoring is becoming a common practice.


Modern employee monitoring solutions help businesses track their employees’ productivity and work attendance, minimize administrative work, and enhance cybersecurity. In this article, we discuss why you should monitor your office staff, list the benefits and shortcomings of doing so, and how to record user sessions and monitor their activities efficiently yet respectfully.

Why monitor employees? Pros and cons



March 19, 2020

Cybersecurity specialists treat remote employees as a threat, and they’re right to do so. However, remote work isn’t a temporary trend — it’s here to stay. Between 2017 and 2018, 36 million (or 25%) of US employees sometimes worked at home according to the US Bureau of Labor Statistics. For lots of specialists, the ability to work outside the office is an important benefit when choosing an employer. Moreover, remote access is required on business trips, for third-party vendors, and during emergencies like pandemics, transport collapses, and extreme weather events....

March 11, 2020

Access control is one of the most important cybersecurity practices. Careful adjustment of users’ access rights helps to secure sensitive data and reduces the chance of a successful attack.


However, choosing a relevant access control model can be tricky. In one of our previous posts, we reviewed role-based and attribute-based access control models. In this post, we discuss definitions of, implementations of, and use cases for the mandatory and discretionary access control models. We also compare two approaches to choosing one over the other.

Why is access...
February 17, 2020

Privileged passwords should be used wisely. These credentials, also called secrets, provide a user with access to protected accounts, systems, networking hardware, cloud instances, and applications. Since privileged accounts also have elevated permissions, passwords to these accounts are often targeted by cybercriminals. In fact, weak, reused, and compromised passwords are the cause of 81% of all data breaches according to the Verizon 2019 Data Breach Investigations Report.


One way to secure privileged passwords is by creating and following a sophisticated password...