+1-202-802-9399 U.S. Headquarters

Thycotic’s Cybersecurity Publication

FEATURED STORY:
5 Shocking Insights into the Social Network Habits of Security Professionals 

Hacking social media accounts has never been easier. Attackers take advantage of poor password hygiene and usually hijack an account and hold it for ransom. It’s difficult to get the real picture, but according to Facebook, accounts are hacked 600,000 times a day. And even worse, 80% of all cyber security attacks involve a weak or stolen password.

Filter by Tags: 

Cyber Security Awareness Month: 5 Predictions for Tomorrow’s Internet

October 18th, 2017

The matter of cyber security is rapidly becoming part of everyone’s daily life. But you can no longer keep your personal and work security habits and precautions separate. In the past cyber-attacks were usually only a concern in the workplace, but today cyber-attacks are so common they affect everyone connected to the internet. Cyber-attacks are…


How to Crack an Active Directory Password in 5 Minutes or Less

October 12th, 2017

Guest column by Semperis. Author: Noa Arias, Director of Marketing at Semperis The massive Equifax data breach compromised sensitive information for roughly 143MM people and is a sobering reminder that security flaws still exist in most organizations. The fact is that most enterprises use Active Directory as the cornerstone of their IT systems and, while AD can…


Cyber Security Awareness Month: Cyber Security in the Workplace is Everyone’s Responsibility

October 10th, 2017

Cyber security is no longer just a technology challenge—it’s a challenge for everybody who uses and interacts with technology daily. That means: everybody in your organization. Cyber security is no longer just the responsibility of the IT department The protection and security of employees’ work and personal lives are no longer separate. They have been…


The Anatomy of a Privileged Account Hack: everything you need to know to protect your organization

October 6th, 2017

Not all hacks, or data breaches, are equal. While many breaches result in inconvenience and minor financial losses, others have the potential to devastate your organization’s finances, credibility, privacy, ability to meet compliance, and much more. A privileged account hack falls into the second category. Our white paper, The Anatomy of a Privileged Account Hack,…


Cyber Security Awareness Month: 6 Simple Steps to Online Safety

October 3rd, 2017

Why do we continue to see so many cyber breaches in spite of our heightened awareness?  When we examine why many of the breaches in recent years have occurred, we can identify three major culprits: the Human Factor, Identities and Credentials, and Vulnerabilities. As a digital social society we are sharing more information publicly, causing…


Integrate the Thycotic Mobile App with Your EMM Solution Instantly

September 28th, 2017

Secure your employee’s BYOD devices before loading Thycotic applications Thycotic has joined forces with AppDome so our customers can easily integrate the Thycotic mobile app with an Enterprise Mobility Management (EMM) solution of their choice. EMM enables IT organizations to manage and secure company data on mobile devices. There are several EMM solutions available including…


How one of the most well known cyber security organizations in the world benefited from privileged account management

September 26th, 2017

Any Privileged Account Management (PAM) solution that you purchase, whether it’s from Thycotic or elsewhere, is nothing more than a tool to help you secure your infrastructure.  That’s a key thing to remember, because as a tool it will not do the job for you, nor suddenly make your organization secure if you do not…


Insider Threat: A New Era and Evolution of the Cyber Security Digital Inside Trader

September 21st, 2017

The insider threat has been a major risk to all governments and organizations around the world for many years. High profile examples are numerous; Nick Leeson and the collapse of Barings bank, Jeffrey Skilling the former Enron President, to the more recent intelligence leaks from Bradley Manning, Edward Snowden, and Reality Winner who disclosed sensitive…


Most Companies Worldwide Fail to Measure Cybersecurity Effectiveness and Performance

September 20th, 2017

More than half the 400 respondents in a survey from the Thycotic-issued study, “2017 State of Cybersecurity Metrics Report”, scored an F or a D grade after evaluating their organization’s efforts to measure their cybersecurity investments and performance against best practices. 58% received an F or D grade Joseph Carson of Thycotic: “It’s astonishing to…


Don’t Let Malware Hit You on the Way Out

September 19th, 2017

Guest column by Semperis. Author: Noa Arias, Director of Marketing at Semperis When it comes to the threat of data breach, it’s well known that current employees can be an organization’s weakest link. What about former employees? So many companies have strict new hire processes in place to onboard new employees, but there’s still a…