Ekran System Blog

News, opinions, and industry insights

September 13, 2019

Every organization has privileged users — employees, subcontractors, and even customers — who are authorized to access critical applications and sensitive data. But those elevated privileges make organizations vulnerable: if a privileged user makes a mistake or an attacker gets access to a privileged account, it puts your most valuable data at risk. According to Centrify’s Privileged Access Management in the Modern Threatscape survey of 1000 IT decision-makers in the U.K. and U.S., compromised credentials of privileged users were involved in 74% of data breaches faced by...

Category:
September 02, 2019

Data breaches caused by insiders can happen to a company of any size and in any industry. According to the 2019 Verizon Data Breach Investigations Report, 34% of data breaches in 2018 involved internal actors. These breaches are harder to detect than attacks perpetrated by outsiders because insiders act normally most of the time. 

 

In this article, we take a look at five real-life cases of data breaches caused by insiders to show this threat from different angles. We also consider the best practices for preventing insider threats and dealing with their...

Category:
August 23, 2019

Every company has plenty of insiders: employees, business partners, third-party vendors. They all have some level of access to corporate infrastructure and business data: some have limited access to general information of low value, while others can easily access the most valuable and sensitive data.

 

This access is what makes insiders one of the greatest threats to a company’s cybersecurity. And this is why understanding the nature of insider attacks is so important. In this article, we take a detailed look at insider threats in cybersecurity, the causes of...

Category:
August 20, 2019

IT solutions in the healthcare industry have already simplified life for both doctors and patients. However, the issue of patients’ data privacy remains a sore point.

 

Even security measures in modern medical software can’t guarantee the safety of data from malicious actors and insider threats. In this article, we show statistics of healthcare data breaches, describe the benefits and risks of IT in the healthcare industry, find out why the current approach is troublesome, and define healthcare security vectors to enhance the protection of sensitive data...

Category:
August 19, 2019

Multi-factor authentication (MFA) is an essential part of today’s identity and access management best practices. It’s also one of the main compliance requirements for user identity verification. MFA allows you to add one more layer of protection to critical endpoints, data, and functionality. The main function of MFA is to make sure that the person or entity trying to access protected assets really is who they claim to be.

 

In this article, we explain what true multi-factor authentication is and take a look at the key two-factor authentication methods you...

Category:

Pages