Ekran System Blog

News, opinions, and industry insights

December 21, 2021

Brute forcing user credentials is one of the easiest ways for hackers to get access to protected resources. The fewer password and access protection measures an organization has in place, the easier it is to steal or guess credentials. During the pandemic and the switch to remote work, the security posture of many organizations weakened. As a result, the amount of brute force attacks spiked from 13% in 2019 to 31.6% in 2020 according to a Kaspersky report [PDF]. And that’s why now is the perfect time to review and enhance your cybersecurity posture.


In this...

December 08, 2021

Detecting malicious activity takes weeks or even months despite the many efforts companies put into building cybersecurity threat detection systems. You can increase your chances of uncovering malicious activity by studying insider threat techniques and applying diverse detection methods.


In this article, we discuss the most common techniques behind insider threats and their possible indicators as well as ways you can detect insider threats in an efficient manner.

Why is early insider threat detection so important?


Insider threats are hard to...

November 23, 2021

Even organizations with productive and loyal employees are prone to malicious insiders who commit fraud. Such activity is not easy to detect because insiders usually mishandle the same data they regularly process as part of their jobs, and do so bit by bit. Also, the motives for committing fraud can be unobvious.


In this article, we define what insider fraud is, what risks it brings, and how security officers can reduce those risks with a comprehensive cybersecurity strategy. We also offer six helpful tips to prevent insider fraud incidents within your organization...

November 09, 2021

A data breach isn’t just a concern for cybersecurity officers anymore. Entailing costly remediation activities and reputational damage, a data breach becomes a complex financial issue for the whole business. Reducing the risk of a data breach can save your company millions of dollars in addition to saving your reputation and client loyalty.


The best way to reduce the cost of a possible data breach is to learn about how breaches happen. In this article, we answer the question What is the average cost of a data breach? We also consider cost-forming factors, cover...

October 27, 2021

Proper implementation of a user and entity behavior analytics (UEBA) tool can solve lots of cybersecurity challenges by detecting well-hidden and slowly executed attacks, automating the analysis of alerts and logs, and speeding up incident investigation. It can even help you improve employee productivity. But implementing a UEBA solution also requires a lot of time and effort along with a clear understanding of how you are going to use it.


In this article, we analyze what cybersecurity challenges you can address with the help of a UEBA solution. We also discuss how...