Ekran System Blog

News, opinions, and industry insights

March 30, 2021

A low level of insider threat awareness among employees can cause all sorts of cybersecurity issues: user negligence and risky behavior resulting in cybersecurity incidents, non-compliance with critical regulations and industry standards, etc. Installing new software and establishing stricter rules can’t always protect an organization from these threats. Raising the cybersecurity awareness level, on the other hand, can.

 

In this article, we discuss what insider threat awareness is, explain why it’s important to raise the level of awareness among your...

Category:
March 16, 2021

Whom can you trust within your network? In the zero trust paradigm, the answer is no one. The zero trust approach to cybersecurity states that access should only be granted after a user is verified and only to the extent needed to perform a particular task.

 

In this article, we take a detailed look at different approaches to zero trust implementation. We explore the basic principles of a zero trust architecture and consider the key pros and cons of this cybersecurity approach.

 

Zero trust in a nutshell

 

No one can be trusted by...

Category:
February 10, 2021

An efficient insider threat program is a core part of any modern cybersecurity strategy. Having controls in place to detect, deter, and respond to insider attacks and inadvertent data leaks is a necessity for any organization that strives to protect its sensitive data. It’s also required by many IT regulations, standards, and laws: NISPOM, NIST SP 800-53, HIPAA, PCI DSS, and others.

 

In this article, we’ll share best practices for developing an insider threat program.

What is an insider threat program?

 

Creating an efficient and...

Category:
February 09, 2021

Every company has plenty of insiders: employees, business partners, third-party vendors. They all have a certain level of access to corporate infrastructure and business data: some have limited access to general information of low value, while others can easily access the most valuable and sensitive data.

 

This access is what makes insiders one of the greatest threats to a company’s cybersecurity. And this is why it’s important to understand what an insider attack is. In this article, we take a detailed look at insider threats in cybersecurity, the causes of...

Category:
February 07, 2021

In striving to make sure in-office and remote employees’ work is secure, organizations often rely on technology-centric approaches. Although user monitoring tools and other cybersecurity solutions do their jobs, they still can’t affect employee behavior and fully secure remote work. To engage remote employees into cybersecurity, organizations are now shifting to a human-centric approach.

 

The people-centric approach to security aims to treat workers more as a cyber shield for corporate data rather than a vulnerability. In this article, we explore what this...

Category:

Pages