Ekran System Blog

News, opinions, and industry insights

August 20, 2019

IT solutions in the healthcare industry have already simplified life for both doctors and patients. However, the issue of patients’ data privacy remains a sore point.

 

Even security measures in modern medical software can’t guarantee the safety of data from malicious actors and insider threats. In this article, we show statistics of healthcare data breaches, describe the benefits and risks of IT in the healthcare industry, find out why the current approach is troublesome, and define healthcare security vectors to enhance the protection of sensitive data...

Category:
August 19, 2019

Multi-factor authentication (MFA) is an essential part of today’s identity and access management best practices. It’s also one of the main compliance requirements for user identity verification. MFA allows you to add one more layer of protection to critical endpoints, data, and functionality. The main function of MFA is to make sure that the person or entity trying to access protected assets really is who they claim to be.

 

In this article, we explain what true multi-factor authentication is and take a look at the key two-factor authentication methods you...

Category:
August 14, 2019

User behavior monitoring is a new approach to insider threat prevention and detection. A lot of companies include a user and entity behavior analytics (UEBA) solution in their insider threat program. Implementing such a program is obligatory to comply with a lot of industry standards (e.g. NIST, HIPAA, PCI DSS, etc.). However, each company is free to use any insider threat prevention tool that meets their needs. 

 

In one of our previous articles, we analyzed what a UEBA solution is. Today, let’s talk about five levels of user behavior monitoring.

What...
Category:
August 08, 2019

Knowledge is power. Especially in the hands of your competitors.

 

Information about your company, its products and services, its finances, its sales, and its marketing strategy is a weapon of modern economic warfare. In this article, we explore the world of industrial espionage and talk about ways to prevent it. Keep calm and take the right measures so your company secrets stay secret.

 

What is industrial espionage?

 

Intelligence on competitors gathered in a legal way can give a leg up in the...

Category:
August 01, 2019

Stopping insider threats isn’t easy. There are a number of behavioral indicators that can help you see where a potential threat is coming from, but this is only half the battle. Reliable insider threat detection also requires tools that allow you to gather full data on user activities. However, fully discounting behavioral indicators is also a mistake. They allow you to detect users that pose increased risks of being malicious insiders and better prepare you for a potential attack by turning your attention to them.

 

In this article, we cover four behavioral...

Category:

Pages