Ekran System Blog

News, opinions, and industry insights

October 05, 2022

The General Data Protection Regulation (GDPR) is often considered the strictest regulation in the world for securing users’ personal data, with fines for non-compliance reaching more than €20 million. The GDPR applies to all organizations processing the personal data of European Union (EU) residents.

 

Do you find it daunting to read through the complex articles of this regulation? Read on to explore the nature and key principles of the GDPR and learn how to meet its major requirements in ten simple steps. This article will be helpful for companies that...

September 28, 2022

Privileged users are an essential part of any organization. However, with access to commercial secrets and to the most vulnerable parts of the corporate network, they can pose high risks to your corporate cybersecurity. For this reason, the more privileges users have, the closer they need to be monitored.

 

Furthermore, privileged user monitoring (PUM) is a requirement of multiple laws, regulations, and data security standards including PCI DSS, SOX, NIST SP 800 171, NIST 800-53, GDPR and HIPAA. In this post, we describe the top 10 PUM best practices for improving the...

September 14, 2022

The world is changing rapidly, with organizations facing new cybersecurity challenges all the time, forcing them to continuously update their cybersecurity strategies. This is especially relevant when it comes to events that have a global effect, like the COVID-19 pandemic and Russia's invasion of Ukraine.

 

To assist organizations in keeping their critical assets safe, we’ve compiled a set of key recommendations on how to protect key data and systems from the different types of cybersecurity threats. This article will be helpful to you in building a...

Category:
September 07, 2022

Negligent or malicious actions of those who have legitimate access to your systems can be more devastating to your company than efforts of outside attackers. The average cost of a single insider threat event in 2022 ranges between $484,931 and $804,997 according to the 2022 Cost of Insider Threats Global Report by the Ponemon Institute. 

 

The good news is that you can avoid falling victim to insider threats by learning from examples of security incidents from other organizations. In this article, we review nine of the most recent large cybersecurity incident...

Category:
August 31, 2022

As the number and severity of cybersecurity attacks rise each year, organizations are compelled to look for measures to protect sensitive data. The abundance of cybersecurity solutions on the market may create confusion and pressure, as choosing the wrong one may lead to security gaps. Many companies turn to data loss prevention (DLP) systems, since they have been on the market for years.

 

But is a DLP system enough to protect your data? Can we consider these time-tested solutions a panacea against all cybersecurity incidents? Stay with us to find out. In this article...

Category:

Pages