Ekran System Blog

News, opinions, and industry insights

August 26, 2020

IT compliance requirements are designed to help companies enhance their cybersecurity and integrate top-level protection into their workflows. But passing an IT security audit can be challenging. Complex requirements, constant changes in standards and laws, and audit processes, and a high number of required security procedures are the key challenges of maintaining compliance.


The way out is with careful preparation and smart planning. By preparing ahead for an audit, you can enhance the security of your organization and achieve full compliance. Read this article to...

August 11, 2020

Education is a strictly regulated industry in which robust cybersecurity protection is a must. Data breaches can cost a fortune for schools and universities, since the loss of students’ personal information and other critical data brings reputational damage alongside fines for regulatory non-compliance.


In the US in 2019 there were 348 publicly disclosed K-12 school-related cybersecurity incidents — triple the number in 2018. In this article, we explain the importance of cybersecurity monitoring for educational institutions, explore the main laws and...

July 28, 2020

Privileged access rights are the gateway to critical systems and data. Providing users with elevated privileges is a standard practice, as employees sometimes need access to sensitive data to perform their jobs. At the same time, there’s always a risk of privilege misuse with the aim of industrial espionage or cyberattacks.


In this article, we explain why elevated privileges can pose a threat to your organization’s cybersecurity, how privilege escalation works, and what risks are hidden behind uncontrolled privilege escalation. We then offer a list of...

July 08, 2020

Data is money and power. And the more valuable the data, the greater the power it provides. This is why financial institutions such as banks, loan services, investment and credit unions, and brokerage firms have always been targeted by cybercriminals. Unfortunately, the financial sector was the industry that suffered the second most data breaches in 2019, surpassed only by the healthcare industry.


One way to enhance data protection in the banking sector is by ensuring proper financial data security compliance with industry standards, international laws, and local...

June 17, 2020

Privileged users are an essential part of any organization. They know all the biggest company secrets and have access to the most vulnerable parts of the corporate network. At the same time, the 2019 Verizon Data Breach Investigations Report [PDF] names privilege abuse as the leading cause of data breaches within the category of misuse. The more privileges are assigned to a user, the closer they should be monitored.


Furthermore, privileged user monitoring (PUM) is a requirement of multiple laws, regulations, and standards including PCI DSS, SOX, NIST 800-53, and...