Ekran System Blog

News, opinions, and industry insights

November 08, 2019

A system administrator is essential for almost any organization. Whether they’re an in-house employee or a subcontractor, a system administrator plays a huge role in keeping your business operating continuously and smoothly and keeping it compliant with enterprise data protection requirements.

 

System administrators have full control over the ins and outs of your database and, in many cases, over its underlying physical infrastructure. That’s why you need to pay close attention to an admin’s actions in order to protect a database. In this article, we...

Category:
October 04, 2019

Governments are one of the biggest cybersecurity spenders. In 2015, for example, the US government included $14 billion in cybersecurity spending in the 2016 budget. In 2019, this number reached over $16 billion, and it’s expected to rise even higher in 2020. Meanwhile, a study by SecurityScorecard shows that US government institutions struggle with many cybersecurity tasks, including patching cadence and ensuring the appropriate level of network and endpoint security.

 

Among the most common causes of cybersecurity incidents, there’s one that deserves...

Category:
September 24, 2019

Employees occasionally make mistakes without realizing how dangerous they can be to the organization’s cybersecurity. Human mistakes were the cause of 21% of data breaches in 2018, according to the 2019 Verizon Data Breach Investigations Report.

 

Employees’ cybersecurity errors can impede company operations or even affect the bottom line. Therefore, it’s better for executives to prevent employees from making cybersecurity mistakes than to remediate their consequences. In this article, we show the latest statistics on employee mistakes and their...

Category:
September 13, 2019

Every organization has privileged users — employees, subcontractors, and even customers — who are authorized to access critical applications and sensitive data. But those elevated privileges make organizations vulnerable: if a privileged user makes a mistake or an attacker gets access to a privileged account, it puts your most valuable data at risk. According to Centrify’s Privileged Access Management in the Modern Threatscape survey of 1000 IT decision-makers in the U.K. and U.S., compromised credentials of privileged users were involved in 74% of data breaches faced by...

Category:
August 23, 2019

Every company has plenty of insiders: employees, business partners, third-party vendors. They all have some level of access to corporate infrastructure and business data: some have limited access to general information of low value, while others can easily access the most valuable and sensitive data.

 

This access is what makes insiders one of the greatest threats to a company’s cybersecurity. And this is why understanding the nature of insider attacks is so important. In this article, we take a detailed look at insider threats in cybersecurity, the causes of...

Category:

Pages