Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Ekran

Privileged Password Policy Compliance Overview: NIST 800-63, HIPAA, PCI DSS, GDPR

Privileged passwords should be used wisely. These credentials, also called secrets, provide a user with access to protected accounts, systems, networking hardware, cloud instances, and applications. Since privileged accounts also have elevated permissions, passwords to these accounts are often targeted by cybercriminals. In fact, weak, reused, and compromised passwords are the cause of 81% of all data breaches according to the Verizon 2019 Data Breach Investigations Report.

Key Features of an Insider Threat Protection Program for the Military

Insider threat protection is an essential activity for government institutions — and especially for national defense organizations. Although cybersecurity in branches of the armed forces is expected to be robust, it still may have flaws. A 2019 report by the Identity Theft Resource Center shows that there were 2,252,439 sensitive records exposed in the government/military sector in 2019.

The Importance of Third-Party Vendor Risk Management for the Banking Industry

Today’s banks and financial institutions closely cooperate with various third-party vendors. While such cooperation brings a lot of benefits, it also raises some significant concerns regarding the security of the data and resources these vendors have access to. In fact, according to Verizon’s 2019 Data Breach Investigations Report, the financial sector is among the most targeted, accounting for about 10% of all data breaches across all industries in 2018.

How to set up two-factor authentication (2FA) on Linux or Windows Server with Ekran System

In this video, you’ll learn how to set up two-factor authentication on your servers using Ekran System’s two-factor authentication tool. This tool uses an industry-recognized format that combines two authentication factors: knowledge of user credentials and possession of a verified mobile device.