
Granting users standing access to privileged resources violates the principle of least privilege and introduces significant risk. With undifferentiated access, users can (and do) take unauthorized actions because they’re given TOTAL control of a resource. They could give a password to another person, who could then access a resource without appearing in an audit trail. They could access critical resources…
Growth is a great problem to have. Suddenly you’re onboarding lots of people, launching products and signing off on new projects. It can also be stressful. Your company is looking to you to keep IT systems running smoothly and securely. As your company grows, the security tools you’ve been using need to keep up with constant…
Security practices are constantly evolving. What might have been considered a state-of-the-art approach ten or even five years ago is no longer defined as a best practice. In the case of securing Remote Desktop Protocol (RDP), PAM practices have followed this pattern of evolution. What was once a common way of securing RDP—jump hosts—is…
PowerShell and other scripting tools are part of an IT professional’s arsenal. They are incredibly powerful, a force multiplier which allows you to automate important or frequently used tasks. The same traits that make these tools a boon for IT pros also make them valuable to malicious actors who can use them to exponentially increase their…
A simple yet effective way of managing business passwords takes high priority on the wish-list of every organization, big and small. This is evidenced by the sheer volume of people searching Google for “business password manager” every day. But what may surprise you is that no matter the size of your business—you must go beyond…
Small and medium-sized businesses (SMBs) face a cyber security trifecta. Cyber criminals are increasingly targeting the most vulnerable businesses (not just the biggest fish). Sophisticated attackers quickly take advantage of newly revealed vulnerabilities. And, cyber security professionals are in short supply. Maybe SMBs aren’t aware that they can use the same types of security systems…
With the recent introduction of Thycotic’s upgraded Secret Server Cloud offering, organizations worldwide now have a full-featured PAM as a service product they can choose to protect their “keys to the kingdom.” That’s because Secret Server Cloud now delivers all the features and capabilities of our Secret Server on-premises flagship product, available in three editions…
Thycotic has just introduced Secret Server Vault—a privileged access management (PAM) solution specifically designed for small to medium size businesses and department-level teams. There are a several big reasons why Secret Server Vault makes sense for SMBs like yours. First and foremost, no matter the size of your business you need enterprise-grade PAM protection. That’s…
Privileged Behavior Analytics Recap Thycotic’s Privileged Behavior Analytics (PBA) software monitors user activity within Secret Server to detect anomalous behavior. Once the user’s baseline activity is determined, deviations from that behavior can trigger alerts or warnings to notify security admins. The software’s machine learning considers the time of day, IP address, user history, Secret importance,…
Is your organization trying to reduce the risk of malware or ransomware? Knowing where to start can be the hardest part. The following risk factors can increase the odds of a cyber attack, and being aware of them can help you focus on and secure your most vulnerable endpoints. Any machine that users check their…