Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

May 2024

Mandatory Access Control vs Discretionary Access Control: Which to Choose?

Access control is one of the most essential cybersecurity practices. Meticulous management of user access rights helps to secure sensitive data and reduces the chance of a successful attack. However, choosing an access control model relevant to your organization can be tricky. This article discusses use cases for mandatory access control (MAC) and discretionary access control (DAC) models. We also show the difference between DAC and MAC to help you choose one over the other.

Ekran System Changes Name to Syteca

We are more, but we are the same. Ekran System Inc. is happy to announce that our company changes its name from Ekran System to Syteca. Following over a decade of continuous development and growth, we see that it’s now the time to expand our product and adjust its perception accordingly. In October 2024, we will take the first steps of transforming into Syteca by releasing a significant expansion of our core platform and changing our website domain from ekransystem.com to syteca.com.

Ekran System Enhances Privileged Access Management: New Workforce Password Management Feature

At Ekran System, we constantly enhance the capabilities of our platform, ensuring that organizations have effective and up-to-date tools to protect their critical assets. This time, we are announcing the release of the Workforce Password Management (WPM) feature. This new functionality aims to improve Ekran System’s privileged access management (PAM) capabilities by streamlining password security and management for all users within an organization.

Mastering Your 2024 Endpoint Security Strategy

In IT, endpoints are the physical devices that connect to a network system. In a corporate environment, endpoints include mobile devices, desktop computers, laptops, servers, and other equipment employees use to access the network and other critical digital systems. A company with fewer than 50 employees typically averages around 22 endpoints, 50-100 employees average more than 100, and companies with more than 1,000 employees average nearly 2,000.

Role-based Access Control vs Attribute-based Access Control: Which to Choose

Access management is a fundamental element of your organization’s security infrastructure. With numerous approaches to implementing an access management system, selecting the most suitable one for your organization may be daunting. In this article, we analyze the two most popular access control models: role-based and attribute-based. We delve into what RBAC and ABAC are, review the pros and cons of each model, compare them, and check if it’s possible to combine them.

The Insider Threat Landscape in 2024

Insider threats pose a substantial risk, stemming from the potential misuse of access granted to employees, contractors, and third-party vendors. These threats, which can be both intentional and accidental, threaten the security of sensitive data and can significantly impact an organization’s financial stability, reputation, and operational efficiency.

How to Record SSH Sessions and Monitor User Activity in Linux with Ekran System [Hands-on Guide]

Monitoring user activity on your critical endpoints is a vital part of an effective cybersecurity strategy. Organizations need to monitor both remote and local user sessions to ensure user accountability, manage cybersecurity risks, enable prompt incident response, and comply with relevant cybersecurity laws and regulations. This is a step-by-step guide on how to monitor user activity in Linux and record remote SSH sessions on any endpoint with the Ekran System software agent installed.

Threat Hunting 2.0: The Future of Proactive Defense

Today, organizations are confronted with a multitude of cybersecurity risks, both from external and internal threats. The global cost of cybercrime is projected to exceed $10 trillion by 2025. In 2023, a staggering 72% of all organizations worldwide fell victim to ransomware attacks, which is just one type of threat. The reality is that cyber threats are pervasive, and the adversaries behind them are becoming increasingly sophisticated with each passing year.

Key Features of an Insider Threat Protection Program for the Military

Insider threat protection is essential for government institutions — especially national defense organizations. As these organizations handle highly classified and sensitive information related to national security, military operations, and intelligence, they are particularly vulnerable to cyberattacks. In this article, we reveal the main insider threats in the defense sector and how to spot them. We also give guidelines on building an effective military insider threat program.

The Top 8 Endpoint DLP Solutions in 2024

Endpoint Data Loss Prevention (DLP) solutions are critical tools for organizations looking to safeguard sensitive information from insider threats, unintentional leaks, and external attacks. These solutions monitor, detect, and block the transfer of valuable data outside company networks, ensuring compliance with data protection regulations. In this post, we’ll explore the top eight endpoint DLP solutions that offer robust security features, ease of use, and integration capabilities.

The Ultimate Guide to Employee Monitoring Software

Did you know that 80% of employees feel more productive when they know their activities are being monitored? Employee monitoring tools offer benefits beyond oversight, fostering accountability and boosting efficiency. In this post, we delve into the world of employee monitoring, exploring its advantages for both employers and employees. From enhancing productivity to ensuring data security, these tools play a crucial role in today's digital work landscape. Stay tuned to discover how employee monitoring can revolutionize your workplace dynamics.

Insider Threats Maintain a Rising Trend

“When the cat’s away, the mouse will play,” the old adage goes. Filings to anti-fraud non-profit Cifas would support that claim, as Insider Threat Database (ITD) reports rose by 14% this past year and are largely attributable to hard-to-monitor work-from-home employees mixed with “increasing financial pressures.” The report details further incidents of dishonest behavior as recorded this year by the UK’s National Fraud Database (NFD).

Software to Track and Block USB Ports on Windows XP

To help you keep legacy systems protected against the dangers of USB devices, CurrentWare now offers a dedicated version of its USB blocker AccessPatrol for Windows XP, allowing you to easily monitor and block USB ports on Windows XP. With AccessPatrol USB port blocker for Windows XP you can create an “allowed list” of authorized USB devices, grant different access levels (read-only, full access, or no access), and get insights into file transfers to portable storage devices.

Business Email Compromise Attacks: How To Prevent & Recover

Imagine receiving a work email from your finance department asking about an overdue invoice. You notice it has a few extra typos and uses strange language, so disregarding it as junk. What you don’t know is that your very busy coworker receives the same email at the same time. Because they’re more distracted than normal, they respond, unknowingly aiding with a business email compromise (BEC) attack.

Top 4 Network Security Risks

Network security integrates different processes, devices, and technologies into a broad plan that safeguards your computer networks' integrity, accessibility, and confidentiality. It keeps your networking infrastructure safe from malicious acts like manipulation and unauthorized access. Network security risks allow malicious actors to cause significant damage to your network while exposing your company's sensitive data. Discussed below are the top four network security risks.

Harnessing Telemetry Data: Strategies for Success

Are you leveraging every piece of data to protect your network? Telemetry data is the automated process of collecting and sending data from remote points to an IT system for monitoring and analysis. Telemetry empowers companies to detect anomalies, predict potential breaches, and respond to threats faster.

Code42 Incydr: Features, Pros, Cons & Alternatives

With the rise of remote work and the increasing prevalence of cyberthreats, companies actively seek robust solutions to safeguard their valuable data assets. One solution that has gained traction recently is Code 42 Incydr, a data risk detection and response platform. Incydr is a SaaS solution that combines data loss prevention (DLP), cloud access security broker (CASB), and user and entity behavior analytics (UEBA) capabilities into a single platform.

Insider Threat vs. Insider Risk: What's the Difference?

Cybersecurity issues more commonly arise from insider activity than outside activity. Of course, attacks by external threat actors still occur, but insider incidents cause most data breaches and leaks. Often, insider threat and insider risk are used interchangeably to describe cybersecurity risks posed by people with inside knowledge of a company.

Telemetry Data: Examples & Types of Data Collected

Telemetry data automatically collects and sends data from various devices to a central location for analysis and monitoring. However, not all data is created equal. To better understand data telemetry and how to leverage it, you also need to understand the different types of data telemetry. This article will discuss various telemetry data examples and types to help you better understand the topic.

Business Email Compromise (BEC): Types & How To Prevent

Many of us think we’re too smart to get scammed by fake company emails. We also believe our biggest cybersecurity threats will be more complex than they have been in the past, and that today’s scammers and phishers will only target government and financial institutions with cutting-edge hacking and infiltration techniques. Regrettably, the threat of seemingly simple business email compromise (BEC) attacks is as prevalent as ever.

24 Real Examples of Business Email Compromise (BEC)

The FBI has named Business Email Compromise (BEC) a $26 billion scam, and the threat is only increasing. Business email compromise (BEC) is a type of cybercrime in which a threat actor uses an email information-seeking scam to target a business to defraud the entire organization. Using social engineering techniques, BEC often occurs over fraudulent emails.

What is a Time Theft and How to Prevent It

Time theft happens when employees dishonestly use their paid work hours for personal activities or tasks unrelated to work. Time fraud significantly impacts an organization’s productivity, business strategy, finances, and employee morale. To keep a high-performing work environment, companies must combat time theft.

Crafting An Effective Insider Threat Incident Response Plan

Organizations face many threats today, but not all potential threats are from malicious activities outside the organization. Insider threats are just as significant, if not more significant, of a security risk to companies today. Since 2018, there has been a 40% increase in data breaches caused by company insiders, so they now represent most of them.

17 Ways To Prevent Insider Threats: Steps, Tips & Tools

When you think of cybersecurity, your mind likely goes to external threat actors — malware, ransomware, spearphishing attacks, and other malicious activity. However, it’s crucial to note that 60% of data breaches are caused by insider threats, and a staggering 74% of organizations are at least moderately vulnerable to them. It’s not everybody else your organization needs to worry about; it’s your own people.

The 2024 Guide to User & Entity Behavior Analytics (UEBA)

User and Entity Behavior Analytics (UEBA) is a long-term that essentially refers to a security process that utilizes analytics to identify abnormal network behavior. UEBA takes a proactive approach by scanning the actions of users and entities within a network. It doesn’t just react to threats but also establishes a baseline from which it learns to be more precise and timely, empowering you to stay ahead of potential security breaches!