Ekran System Blog

News, opinions, and industry insights

May 05, 2021

A data breach is one of the biggest threats to an organization. It can harm an organization’s reputation and entail huge financial losses. According to the Cost of a Data Breach Report 2020 by IBM [PDF], the average cost of a data breach is estimated at $3.86 million. Thus, preventing data breaches and investigating them in a timely manner are among the most sensitive pain points when it comes to an organization’s cybersecurity.


In this article, we describe seven steps of how to investigate a data breach and explain what to pay special attention to during...

April 27, 2021

Data security is key. Incidents of data exfiltration bring lots of unwanted attention to organizations and lead to reputational and financial losses. That’s why companies in various industries pay maximum attention to their cybersecurity measures and constantly enhance them.


In this article, we define what data exfiltration is and how it’s performed. We also explore some recent examples of data loss and offer eight best practices that will help you prevent data exfiltration.

Data exfiltration: definition, consequences, and possible attackers


April 13, 2021

A low level of insider threat awareness among employees can cause all sorts of cybersecurity issues: user negligence and risky behavior resulting in cybersecurity incidents, non-compliance with critical regulations and industry standards, etc. Installing new software and establishing stricter rules can’t always protect an organization from these threats. Raising the cybersecurity awareness level, on the other hand, can.


In this article, we discuss what insider threat awareness is, explain why it’s important to raise the level of awareness among your...

March 16, 2021

Whom can you trust within your network? In the zero trust paradigm, the answer is no one. The zero trust approach to cybersecurity states that access should only be granted after a user is verified and only to the extent needed to perform a particular task.


In this article, we take a detailed look at different approaches to zero trust implementation. We explore the basic principles of a zero trust architecture and consider the key pros and cons of this cybersecurity approach.


Zero trust in a nutshell


No one can be trusted by...

March 02, 2021

In 2020, remote work became not just a trend but a must for many companies. Yet ensuring secure telecommuting turned out to be a challenge for cybersecurity teams: Remote employees tend to use insecure tools, work in unprotected environments, and mismanage sensitive data. All of this increases the risk of insider threats. 


In this article, we take a close look at the challenges remote employees bring and the risks they can pose to your organization. We also offer six best practices for insider risk management.

Insider threats vs insider risks