Ekran System Blog

News, opinions, and industry insights

November 23, 2021

Even organizations with productive and loyal employees are prone to malicious insiders who commit fraud. Such activity is not easy to detect because insiders usually mishandle the same data they regularly process as part of their jobs, and do so bit by bit. Also, the motives for committing fraud can be unobvious.


In this article, we define what insider fraud is, what risks it brings, and how security officers can reduce those risks with a comprehensive cybersecurity strategy. We also offer six helpful tips to prevent insider fraud incidents within your organization...

November 09, 2021

A data breach isn’t just a concern for cybersecurity officers anymore. Entailing costly remediation activities and reputational damage, a data breach becomes a complex financial issue for the whole business. Reducing the risk of a data breach can save your company millions of dollars in addition to saving your reputation and client loyalty.


The best way to reduce the cost of a possible data breach is to learn about how breaches happen. In this article, we answer the question What is the average cost of a data breach? We also consider cost-forming factors, cover...

October 27, 2021

Proper implementation of a user and entity behavior analytics (UEBA) tool can solve lots of cybersecurity challenges by detecting well-hidden and slowly executed attacks, automating the analysis of alerts and logs, and speeding up incident investigation. It can even help you improve employee productivity. But implementing a UEBA solution also requires a lot of time and effort along with a clear understanding of how you are going to use it.


In this article, we analyze what cybersecurity challenges you can address with the help of a UEBA solution. We also discuss how...

October 13, 2021

Protecting your sensitive data and other critical assets requires establishing secure access to them in the first place. Lots of organizations do this by protecting their remote servers and corporate systems with SSH keys. However, even SSH keys can be compromised and abused by malicious actors.


In this article, we talk about SSH keys and their role in secure authentication processes as well as about the benefits of effective SSH key management. Also, we offer six useful practices that will help you secure your digital keys.

SSH key authentication management...
September 28, 2021

Departing employees are a source of insider threats that often get overlooked. According to a study by Biscom, one in four departing employees steal data when leaving. Whether they do so out of negligence or with malicious intent, such cases can only have negative outcomes for organizations, from losing their competitive advantage to facing penalties for non-compliance with cybersecurity requirements.


The good news is that you can detect this dangerous insider activity and mitigate it before employees leave with corporate data. In this article, we take a look at the...