+1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

The Lockdown’s 10 Most Popular Blogs of 2017

January 10th, 2018


SHARE THIS

Tags

2017 was a record year for cyber security with breaches and hacks making headlines just about every day.  Thank you for following along with the 2017 chaos as we captured the biggest breaches, security nightmares, and attacks.


As a recap, here are the “Top 10” posts from the blog, sorted in increasing order based on readership. Let the countdown begin!


#10: How Does Encryption Work? 

Going back to the basics – readers took a chance to gain a basic understanding of how encryption really works.



#9:  Ransomware goes into stealth mode: 7 things you can do to protect yourself

Ransomware upped the ante in 2017 and went into stealth mode. How did you take action to protect your enterprise?



#8: The Tide is Turning for Privileged Account Management and Security.

Privileged Account Management is ever-changing. In 2017 we listened to our customers and will continue to stay at the forefront of your needs and security.



#7: MSPs and IT Providers: The Three Things Every MSP Must Do

Guest author and security expert, Ian Trump, shares the 3 most important security to-dos for every MSP and IT Provider.



#6: Big News: UNLOCKED 2017 Official Announcement

Our biggest UNLOCKED Conference EVER was hosted this year in the nation’s capital. Thank you to our customers and the InfoSec community for making it such a memorable event. 



#5: Top takeaways from Symantec’s Internet Security Threat Report 2017.

The latest Symantec report summarizes the state of cyber threats across the world. Our cyber security expert shares the biggest surprises from the report around IoT, open-source security tools used by hackers, and ransomware.



#4: Infographic: How to Promote Information Security in the WorkplaceThe University of Alabama at Birmingham hit home the importance of user awareness around cyber security with a well-designed infographic. Check it out! 



#3: 5 Shocking Insights into the Social Network Habits of Security Professionals

Do all cyber security pros practice what they preach? Find out!



#2: How to Crack an Active Directory Password in 5 Minutes or Less.

Most enterprises use Active Directory as the cornerstone to their IT infrastructure. After the Equifax data breach, we asked, “How quickly can a hacker gain access to Active Directory”?



#1: Surprising Takeaways from the 2017 Verizon Data Breach Investigations Report

It’s no surprise this blog post takes the #1 spot! Our cyber security expert shares his top takeaways from the 2017 Verizon Data Breach Investigations Report, one of the most popular reports in InfoSec.

There you have it, a roundup of the top 10 2017 blogs on The Lockdown. What is your top 2017 cyber security takeaway?


The following two tabs change content below.

Jordan True

Jordan is a social media strategist, digital community manager and a lover of all things IT. She currently manages the Social Media Program at Thycotic and loves to connect with technology communities online and at enterprise IT events. Addicted to the outdoors, you can find Jordan on the running trails in her free time or sharing the latest InfoSec buzz on Twitter @ThycoticJordan.

Leave a Reply

*