Ekran System Blog

News, opinions, and industry insights

March 09, 2022

Malicious insiders remain one of the key threats to corporate cybersecurity. But we can outline the latest industry trends and determine ways to efficiently combat this threat by analyzing the percentage of threats posed by insiders and attack vectors in recently published cybersecurity reports.


In this article, we summarize takeaways from the latest insider threat statistics prepared by industry experts to help you better understand insider threat-related risks and adjust your cybersecurity measures accordingly.


Research on insider threat...
February 21, 2022

Cybersecurity threats have been a headache for the hospitality industry for many years. When the COVID-19 pandemic turned this industry upside down, attempts to stay in business put many hotels in an even riskier position in terms of security. For example, many organizations followed the example of hotels in Amsterdam that diversified their services and turned guest rooms into offices for remote employees. Such moves generated profit for the hotels but also created new vulnerabilities.


Changes in how hotels worked make their networks, internal infrastructure, and...

February 14, 2022

The more access rights an employee has, the more possibilities they have to misuse or abuse privileges. According to the ENISA Threat Landscape 2021 report, a third of surveyed organizations suffered from privilege abuse by insiders during the period from April 2020 through July 2021.


That’s why establishing an appropriate level of privileged account management plays a significant role in ensuring your organization’s cybersecurity. In this article, we disclose how to effectively manage accounts with elevated privileges using privileged account and session...

January 28, 2022

Active Directory (AD) is a useful service that helps organizations manage identities and control access to network resources, thus improving corporate cybersecurity. However, when poorly managed, AD can be exploited in a way that hurts an organization’s cybersecurity.


In this article, we briefly define what Active Directory is and list its main services and possible threats. We also explore in detail two proven ways to keep AD safe and sound: an Active Directory audit and privileged access management.


The importance of Active Directory...
January 21, 2022

Privilege abuse is the top misuse-related reason for data breaches according to the 2021 Data Breach Investigations Report by Verizon. To mitigate the risk of data leaks and other incidents, it’s crucial to enhance the protection of critical assets and keep a close eye on the activity of privileged users.


Yet it can become a real ordeal for an IT security manager not only to secure access to their organization’s servers but also to track and manage all privileged sessions. In this article, we discuss the importance of privileged session management (PSM)...