+1-202-802-9399 U.S. Headquarters

Thycotic’s Cybersecurity Publication

FEATURED STORY:
Ransomware goes into stealth mode: 7 things you can do to protect yourself

Ransomware is a destructive variant of malicious malware. It makes critical systems and sensitive information inaccessible until a ransom is paid. Ransom is typically demanded in bitcoin with a 72 hour window to pay before the key is deleted and data is irreversibly lost. Now, it has evolved. Here’s how you protect your organization from the losses suffered in a ransomware attack.

Filter by Tags: 

Privileged Behavioral Analytics 101 – How does PBA strengthen IT security

March 21st, 2017

According to Forrester, it is estimated that 80% of breaches involve privileged accounts. Many of those breaches are due to compromised privileged accounts or insider abuse. Our privileged account management tool, Secret Server, already assists you by safeguarding your privileged accounts by storing them in an encrypted repository where you can launch sessions using the […]


A Cloud-First Strategy

March 14th, 2017

Guest column by Mike Somerville originally posted on Ed TechDigest on February 16, 2017 As Manager of Systems Support and Chief Cloud Evangelist, I lead the IT systems team at the University of San Diego. We’re responsible for four data centers, the network, virtualization, servers, and more—everything that needs a password for access. Automating Privileged […]


U Behave Yourself… or consider User Behavior Analytics

March 9th, 2017

Get a load of this: an alarming 57 percent of Americans believe that they know as much, or more, about cybersecurity as their IT Directors, according to a comprehensive survey conducted on behalf of Blumberg Capital. This same group of individuals reported that keeping their work passwords secure (10 percent) is only a little more […]


Washington SmartCEO Recognizes Kathy Moore as a 2017 Executive Management Award Winner

March 7th, 2017

Congratulations to Kathy Moore, Thycotic’s Chief Financial Officer, on winning the 2017 Executive Management Award from SmartCEO! The Executive Management Awards (EMA) program recognizes the top leadership and management in Washington, D.C. Kathy couldn’t be more deserving of this award as she has had a direct positive contribution in leading our expansion efforts and success […]


Phishing Scams: Your Social Media and Email Security Checklist

March 2nd, 2017

Phishing scams are on the rise, and they surge during tax season. Phishing is the practice of sending a potential victim an email or message that looks like legitimate correspondence from the IRS,  a bank, or an organization, but clicking on links within the message takes the victim to a fake website. Once on the website (which often also […]


Cloudbleed – Could this be the worst security event in history?

February 27th, 2017

First and foremost – Thycotic does not use Cloudflare for any of our cloud based products, such as Secret Server Cloud or our upcoming Privileged Behavior Analytics. We don’t anticipate our customers being affected by this directly, unless passwords used to access our services are the same as passwords used to access affected websites. It’s […]


Ransomware goes into stealth mode: 7 things you can do to protect yourself

February 27th, 2017

Ransomware is a very destructive variant of malicious malware that makes critical systems and sensitive information inaccessible until a ransom is paid. Ransom is typically demanded in bitcoin with a 72 hour window to pay before the key is deleted and data is irreversibly lost. Some variants have started deleting data before the 72 hours […]


Privileged Account Management Moves to the Cloud

February 22nd, 2017

How a cloud-first strategy works to secure student data and meet compliance mandates. Guest Column by Mike Summerville, University of San Diego and featured in EdTech Magazine. Automating Privileged Account Password Security As Manager of Systems Support and Chief Cloud Evangelist, I lead the IT systems team at the University of San Diego. We’re responsible for […]


The Password Love Affair: Would you share your password with your partner?

February 14th, 2017

Passwords, for many people and companies, are one of the vital security controls that protect us from external hackers and cyber threats. Passwords are part of everyday life and protect our privacy and sensitive information from unauthorized access. Every day billions of people power up their devices and connect to the internet to access online […]


Top 4 Password Blunders And How Thycotic Can Help

January 24th, 2017

Satisnet Ltd Guest Post The fact is that however bad a solution they are, we are all stuck using passwords and will be for the foreseeable future. Here are the typical bad password practices I see when I’ve visited enterprises over recent times. 1. PASSWORD IN SPREADSHEETS, NOTEPAD FILES, NOTEBOOKS, PHOTOS ON PHONES ETC ETC So, what’s […]