Ekran System Blog

News, opinions, and industry insights

November 08, 2019

A system administrator is essential for almost any organization. Whether they’re an in-house employee or a subcontractor, a system administrator plays a huge role in keeping your business operating continuously and smoothly and keeping it compliant with enterprise data protection requirements.


System administrators have full control over the ins and outs of your database and, in many cases, over its underlying physical infrastructure. That’s why you need to pay close attention to an admin’s actions in order to protect a database. In this article, we...

October 04, 2019

Governments are one of the biggest cybersecurity spenders. In 2015, for example, the US government included $14 billion in cybersecurity spending in the 2016 budget. In 2019, this number reached over $16 billion, and it’s expected to rise even higher in 2020. Meanwhile, a study by SecurityScorecard shows that US government institutions struggle with many cybersecurity tasks, including patching cadence and ensuring the appropriate level of network and endpoint security.


Among the most common causes of cybersecurity incidents, there’s one that deserves...

September 24, 2019

Employees occasionally make mistakes without realizing how dangerous they can be to the organization’s cybersecurity. Human mistakes were the cause of 21% of data breaches in 2018, according to the 2019 Verizon Data Breach Investigations Report.


Employees’ cybersecurity errors can impede company operations or even affect the bottom line. Therefore, it’s better for executives to prevent employees from making cybersecurity mistakes than to remediate their consequences. In this article, we show the latest statistics on employee mistakes and their...

September 13, 2019

Every organization has privileged users — employees, subcontractors, and even customers — who are authorized to access critical applications and sensitive data. But those elevated privileges make organizations vulnerable: if a privileged user makes a mistake or an attacker gets access to a privileged account, it puts your most valuable data at risk. According to Centrify’s Privileged Access Management in the Modern Threatscape survey of 1000 IT decision-makers in the U.K. and U.S., compromised credentials of privileged users were involved in 74% of data breaches faced by...

August 20, 2019

IT solutions in the healthcare industry have already simplified life for both doctors and patients. However, the issue of patients’ data privacy remains a sore point.


Even security measures in modern medical software can’t guarantee the safety of data from malicious actors and insider threats. In this article, we show statistics of healthcare data breaches, describe the benefits and risks of IT in the healthcare industry, find out why the current approach is troublesome, and define healthcare security vectors to enhance the protection of sensitive data...