Ekran System Blog

News, opinions, and industry insights

June 23, 2021

While organizations are spending a good deal of money protecting their data against unauthorized access from the outside, malicious insiders may pose no less harm. According to the 2021 Data Breach Investigation Report [PDF] by Verizon, 36% of all data breaches experienced by large organizations in 2020 were caused by internal actors. For small and midsize businesses, it was 44%.


Organizations that become victims of malicious insider attacks face many negative consequences: from loss of confidential data, revenue, and clients to reputational harm or even going out of...

June 02, 2021

Whether intentionally or not, insiders are often behind massive cybersecurity incidents. According to Forrester, data breaches caused by insiders will account for 33% of all cybersecurity incidents in 2021. The good news is that you can learn how to effectively prevent devastating cybersecurity incidents from the experience of other organizations.


In this article, we review ten large cybersecurity incident examples from the past few years that affected world-known organizations:





Trend Micro...

May 17, 2021

Original ideas, developments, and trade secrets help businesses increase their value and stand out among competitors. But as market competition grows, the risks of intellectual property (IP) theft and leaks also grow. Establishing basic security policies and procedures to protect sensitive data is crucial if you want to continue to benefit from your intellectual property.


In this article, we dig into the importance of intellectual property protection and explore possible scenarios of intellectual property theft. We also offer seven best practices to help you secure...

May 05, 2021

A data breach is one of the biggest threats to an organization. It can harm an organization’s reputation and entail huge financial losses. According to the Cost of a Data Breach Report 2020 by IBM, the average cost of a data breach is estimated at $3.86 million. Thus, preventing data breaches and investigating them in a timely manner are among the most sensitive pain points when it comes to an organization’s cybersecurity.


In this article, we describe seven steps of how to investigate a data breach and explain what to pay special attention to during data...

April 26, 2021

Data security is key. Incidents of data exfiltration bring lots of unwanted attention to organizations and lead to reputational and financial losses. That’s why companies in various industries pay maximum attention to their cybersecurity measures and constantly enhance them.


In this article, we define what data exfiltration is and how it’s performed. We also explore some recent examples of data loss and offer eight best practices that will help you prevent data exfiltration.

Data exfiltration: definition, consequences, and possible attackers