Ekran System Blog

News, opinions, and industry insights

March 19, 2020

Cybersecurity specialists treat remote employees as a threat, and they’re right to do so. However, remote work isn’t a temporary trend — it’s here to stay. Between 2017 and 2018, 36 million (or 25%) of US employees sometimes worked at home according to the US Bureau of Labor Statistics. For lots of specialists, the ability to work outside the office is an important benefit when choosing an employer. Moreover, remote access is required on business trips, for third-party vendors, and during emergencies like pandemics, transport collapses, and extreme weather events....

Category:
March 11, 2020

Access control is one of the most important cybersecurity practices. Careful adjustment of users’ access rights helps to secure sensitive data and reduces the chance of a successful attack.

 

However, choosing a relevant access control model can be tricky. In one of our previous posts, we reviewed role-based and attribute-based access control models. In this post, we discuss definitions of, implementations of, and use cases for the mandatory and discretionary access control models. We also compare two approaches to choosing one over the other.

Why is access...
Category:
February 17, 2020

Privileged passwords should be used wisely. These credentials, also called secrets, provide a user with access to protected accounts, systems, networking hardware, cloud instances, and applications. Since privileged accounts also have elevated permissions, passwords to these accounts are often targeted by cybercriminals. In fact, weak, reused, and compromised passwords are the cause of 81% of all data breaches according to the Verizon 2019 Data Breach Investigations Report.

 

One way to secure privileged passwords is by creating and following a sophisticated password...

Category:
January 30, 2020

Insider threat protection is an essential activity for government institutions — and especially for national defense organizations. Although cybersecurity in branches of the armed forces is expected to be robust, it still may have flaws. A 2019 report by the Identity Theft Resource Center shows that there were 2,252,439 sensitive records exposed in the government/military sector in 2019.

 

In this article, we highlight the role of insider threats in the defense industry and list major features of an insider threat protection program for the military. This article...

Category:
January 20, 2020

Today’s banks and financial institutions closely cooperate with various third-party vendors. While such cooperation brings a lot of benefits, it also raises some significant concerns regarding the security of the data and resources these vendors have access to. In fact, according to Verizon’s 2019 Data Breach Investigations Report, the financial sector is among the most targeted, accounting for about 10% of all data breaches across all industries in 2018.

 

In this article, we discuss the key reasons why financial institutions hire independent contractors...

Category:

Pages