+1-202-802-9399 U.S. Headquarters

Thycotic’s Cybersecurity Publication

FEATURED STORY:
Ransomware goes into stealth mode: 7 things you can do to protect yourself

Ransomware is a destructive variant of malicious malware. It makes critical systems and sensitive information inaccessible until a ransom is paid. Ransom is typically demanded in bitcoin with a 72 hour window to pay before the key is deleted and data is irreversibly lost. Now, it has evolved. Here’s how you protect your organization from the losses suffered in a ransomware attack.

Filter by Tags: 

Part 2: How did my password get hacked? It’s this easy…

May 24th, 2017

I’ll pick up where we left off in Part 1: How did my password get hacked? That’s where I explained that the reason your account was hacked was probably NOT due to some sophisticated state actor from China or Russia. So to recap, the top three reasons your password was hacked were most likely: You had a different account…


Oops! Your files have been encrypted! How to avoid that dreaded Ransomware Message

May 17th, 2017

Even People Who Know Better Fall Prey to Cyber Attacks. After all, it wasn’t a bunch of Facebook junkies or six-year-olds who clicked on the e-mail links that launched WannaCry (also known as WannaDecryptor) ransomware attacks that infected computers in as many as 150 countries. Instead professionals in the workplaces of the world were caught off-guard…


#DontCry with #WannaCry – Do not become the next victim of Ransomware

May 16th, 2017

Ransomware has become a major threat and high risk to many individuals and organizations worldwide. It is a very destructive variant of malicious malware. When it impacts systems it makes critical systems and sensitive information inaccessible until a ransom is paid. Ransom is typically is paid via bitcoins within 72 hours and if unpaid the…


How mature is Australia really, when it comes to cyber security?

May 16th, 2017

Guest blog post by emt Distribution.  According to The Australian Strategic Policy Institutes’ report on Cyber Maturity in the Asia-Pacific Region (2016), Australia is ranked at 4th place, one up from the weighted scores in 2015. Who’s doing better? The US, South Korea, and Japan, followed by Singapore, then New Zealand. So why are we not ranked…


Ransomware: Threats, Impact and Expert Recommendations on How to Defend Against It

May 15th, 2017

The massive ransomware infection that spread across computers in over 99 countries on Friday, May 12th 2017, crippling hospitals and businesses, demonstrated how devastating a cyber attack can be on a global level. The timing of this ransomware attack is no coincidence, as many European organizations were wrapping up their day, only to find out…


Part 1: How did my password get hacked? It’s simple…

May 11th, 2017

I wish that we could tell you that the reason your password and account were hacked was due to some really high tech and sophisticated character in a dark room lit only by a giant panel of computer monitors.  Just like you see on your favorite TV show.  Unfortunately, this isn’t the case. It’s not…


10 Tips to Ensure your Privileged Accounts for IoT are Protected and Secured

May 10th, 2017

Welcome to the world of IoT (Internet of Things) where more and more devices get connected online by the minute, with approximately 9 billion devices connected today.  Every day billions of employees power up their devices and connect to the internet to plug into their everyday world: check the news, receive and respond to emails, chat…


MSPs and IT Providers: The Three Things Every MSP Must Do

May 8th, 2017

Guest post by Ian Trump. Please find his full bio below in the author section. MSPs and IT providers have a problem, and it’s about to get a whole lot worse. By the time you land your third customer, you need to get a grip on three important things: Regular Daily Backup Invoicing and Time…


Cybersecurity Awareness: Empowering Our People

May 5th, 2017

Guest column by SailPoint, the leader in enterprise identity management, brings the Power of Identity to customers around the world. As both an industry pioneer and market leader in identity governance, SailPoint delivers security, operational efficiency and compliance to enterprises with complex IT environments. Author: Darren Rolls Like it or not, when it comes to…


Surprising Takeaways from the 2017 Verizon Data Breach Investigations Report

May 3rd, 2017

2016 was a major year for cyber-crime and disruption, with many major significant data breaches (the presidential elections), the Distributed Denial of Service (DDoS) attacks using a botnet of Internet of Things (IoT), and the biggest data disclosure to date, twice, with Yahoo. This is now the 10th version of the Verizon Data Breach Investigations Report…