Ekran System Blog

News, opinions, and industry insights

March 31, 2020

With the number of insider-related breaches rising every year, employee monitoring is becoming a common practice.


Modern employee monitoring solutions help businesses track their employees’ productivity and work attendance, minimize administrative work, and enhance cybersecurity. In this article, we discuss why you should monitor your office staff, list the benefits and shortcomings of doing so, and explore best practices for monitoring your employees efficiently yet respectfully.

Why monitor employees? Pros and cons



March 19, 2020

Cybersecurity specialists treat remote employees as a threat, and they’re right to do so. However, remote work isn’t a temporary trend — it’s here to stay. Between 2017 and 2018, 36 million (or 25%) of US employees sometimes worked at home according to the US Bureau of Labor Statistics. For lots of specialists, the ability to work outside the office is an important benefit when choosing an employer. Moreover, remote access is required on business trips, for third-party vendors, and during emergencies like pandemics, transport collapses, and extreme weather events....

March 11, 2020

Access control is one of the most important cybersecurity practices. Careful adjustment of users’ access rights helps to secure sensitive data and reduces the chance of a successful attack.


However, choosing a relevant access control model can be tricky. In one of our previous posts, we reviewed role-based and attribute-based access control models. In this post, we discuss definitions of, implementations of, and use cases for the mandatory and discretionary access control models. We also compare two approaches to choosing one over the other.

Why is access...
February 17, 2020

Privileged passwords should be used wisely. These credentials, also called secrets, provide a user with access to protected accounts, systems, networking hardware, cloud instances, and applications. Since privileged accounts also have elevated permissions, passwords to these accounts are often targeted by cybercriminals. In fact, weak, reused, and compromised passwords are the cause of 81% of all data breaches according to the Verizon 2019 Data Breach Investigations Report.


One way to secure privileged passwords is by creating and following a sophisticated password...

January 30, 2020

Insider threat protection is an essential activity for government institutions — and especially for national defense organizations. Although cybersecurity in branches of the armed forces is expected to be robust, it still may have flaws. A 2019 report by the Identity Theft Resource Center shows that there were 2,252,439 sensitive records exposed in the government/military sector in 2019.


In this article, we highlight the role of insider threats in the defense industry and list major features of an insider threat protection program for the military. This article...