Ekran System Blog

News, opinions, and industry insights

June 02, 2020

High employee productivity is vital for your business’s success. Yet only 34% of US employees are engaged with their work (and 13% are actively disengaged) according to a 2018 poll by Gallup. But the productivity of even the most engaged employees tends to decrease over time. Workers require constant support to stay productive. This is especially important when dealing with remote employees, as they aren’t within their manager’s eyesight and have lots of domestic distractions.


User activity monitoring (UAM) is a common solution for issues with...

May 18, 2020

Monitoring employees is one way to ensure a productive and secure workflow within an organization. However, not all employees like being watched. Some even challenge the ethics and legality of workplace surveillance.


In this article, we explore the nature of workplace surveillance and consider the laws US employers should know and follow if they want to monitor their employees. We also look closely at an important part of workplace surveillance — employee monitoring — and provide you with six employee monitoring recommendations.

May 12, 2020

Every company has workers that have been there from the beginning and worked in every department. They know everything about the company’s processes, and it makes them valuable employees. But they also can access sensitive data, and that makes them dangerous. A periodic user access review can mitigate this danger.


Reviewing user access is an essential part of access management. In this article, we discuss the definition and importance of user access rights review and IT regulations require you to do this. Then we arm you with user access review best practices...

April 29, 2020

Privileged access is granted to certain users so they can perform their work. Yet admin and service accounts often are the causes of cybersecurity incidents since they allow their owners to install and remove software, modify system configurations, and more. Even with privileged access management practices in place, malicious actors can continue to find new ways to compromise your sensitive data. However, a new just-in-time PAM approach promises to improve the situation.


In this article, we explain what just-in-time privileged access management is and how it helps...

April 13, 2020

People tend to trust those they work with: employees, business partners, subcontractors. But these people, who have access to all kinds of corporate data, don’t always prove worthy of such trust. Insider data theft statistics show that one in four employees won’t think twice before stealing sensitive data from their current company if it will help them sign a contract with a competitor. And according to Verizon’s 2019 Data Breach Investigation Report, 34% of data breaches in 2018 were caused by insiders.


In this article, we investigate the problem...