Thycotic will be closed Thursday and Friday, Nov. 26th and 27th for the Thanksgiving holiday. More info »

  • 09 JUN 15

Why do employees choose to become insider threats?

A company went out of business. A person was marked as deceased in a large government database. A company’s domain name was added to anti-spam blacklists. All of these are outcomes of insider threat cases documented in The CERT Guide to Insider Threats, and could easily happen to any business today that does not have the

  • 03 MAR 15

The Top Three Ways Personally Identifiable Information is Leaked in Healthcare

Personally identifiable information (PII) related to healthcare data is 50x more valuable on the black market than credit card data according to Alert Logic. Forty three percent of all identity thefts in the United States in 2013 were accounted to medical related identity theft (Logic, 2014). The healthcare industry knows they need to protect PII. It’s

  • 09 DEC 14

When the Trusted Go Rogue, and How They (almost) Got Away With It

Jason Cornish, a former IT admin, successfully took down 88 servers of a major pharmaceutical corporation for the comfort of a fast food joint. The breach cost the company over $800,000 and caused the entire US office to shut down for three days. Unfortunately for all companies, insider threat is very hard to detect. According

  • 28 OCT 14

Haunting Tale: Beware of the Insider

We all love October for the fall nights, changing leaves, hot cider and Halloween festivities. October is also National Cyber Security Awareness Month suported by the National Cyber Security Alliance. Although we preach cyber security best practices all year, it’s an important reminder to stay safe online. In support of National Cyber Security Awareness Month

  • 29 APR 14

Don’t be the next target! Insider Threat Webinar: Tuesday, May 6 2014

What is the biggest threat to your sensitive information? The security breaches at Shionogi Pharmaceuticals, South Carolina Department of Revenue and the United Way weren’t caused by external threats – they were initiated by an insider; a seemingly trustworthy employee or ex-employee of the company that had privileged account credentials allowing access to the organization’s