Ekran System Blog

News, opinions, and industry insights

May 18, 2020

Monitoring employees is one way to ensure a productive and secure workflow within an organization. However, not all employees like being watched. Some even challenge the ethics and legality of workplace surveillance.

 

In this article, we explore the nature of workplace surveillance and consider the laws US employers should know and follow if they want to monitor their employees. We also look closely at an important part of workplace surveillance — employee monitoring — and provide you with six employee monitoring recommendations.

Workplace...
Category:
May 12, 2020

Every company has workers that have been there from the beginning and worked in every department. They know everything about the company’s processes, and it makes them valuable employees. But they also can access sensitive data, and that makes them dangerous. A periodic user access review can mitigate this danger.

 

Reviewing user access is an essential part of access management. In this article, we discuss the definition and importance of user access rights review and IT regulations require you to do this. Then we arm you with user access review best practices...

Category:
April 29, 2020

Privileged access is granted to certain users so they can perform their work. Yet admin and service accounts often are the causes of cybersecurity incidents since they allow their owners to install and remove software, modify system configurations, and more. Even with privileged access management practices in place, malicious actors can continue to find new ways to compromise your sensitive data. However, a new just-in-time PAM approach promises to improve the situation.

 

In this article, we explain what just-in-time privileged access management is and how it helps...

Category:
April 13, 2020

People tend to trust those they work with: employees, business partners, subcontractors. But these people, who have access to all kinds of corporate data, don’t always prove worthy of such trust. Insider data theft statistics show that one in four employees won’t think twice before stealing sensitive data from their current company if it will help them sign a contract with a competitor. And according to Verizon’s 2019 Data Breach Investigation Report, 34% of data breaches in 2018 were caused by insiders.

 

In this article, we investigate the problem...

Category:
March 31, 2020

With the number of insider-related breaches rising every year, employee monitoring is becoming a common practice.

 

Modern employee monitoring solutions help businesses track their employees’ productivity and work attendance, minimize administrative work, and enhance cybersecurity. In this article, we discuss why you should monitor your office staff, list the benefits and shortcomings of doing so, and explore best practices for monitoring your employees efficiently yet respectfully.

Why monitor employees? Pros and cons

 

Does...

Category:

Pages