Contact Us +1-202-802-9399 U.S. Headquarters
Free Trial

Archive for the ‘Best Practices’ Category

Bangledesh Bank: Privileged Account Exposure Leads to $81 Million Loss

Thursday, April 28th, 2016

Remember the hackers that stole more than $80 million from Bangladesh Bank back in February? According to a new Reuters report, not only did they get away with a large amount of money, they may have also hacked the Society for Worldwide Interbank Financial Telecommunication (SWIFT), an organization which provides a network that enables financial […]

KuppingerCole Report: Protecting the keys to your kingdom against cyber-attacks and insider threats

Tuesday, March 8th, 2016

In November 2015, KuppingerCole released a White Paper titled “Protecting the keys to your kingdom against cyber-attacks and insider threats” outlining the state of security surrounding organizations protecting their privileged accounts throughout their organizations. In this blog post, I’d like to highlight a couple of critical points KuppingerCole makes in this report and expand a […]

5 Reasons you’ll love Thycotic’s Free Privileged Password Security Policy Template

Monday, November 16th, 2015

Privileged accounts are a favorite target for hackers—it’s critical that your organization’s IT Admins have a password protection policy in place to prevent attacks. So Thycotic and Information Shield partnered to create an easy-to-use, free password security policy template for organizations that do not yet have an official privileged account management policy. Don’t have a […]

Achieve PII Compliance Through Security Awareness Training

Monday, November 2nd, 2015

What is PII? Personally Identifiable Information (PII) is defined by the National Institute of Standards and Technology (NIST) as: Information which can be used to distinguish or trace an individual’s identity, such as their name, social security number, biometric records, etc., alone, or when combined with other personal or identifying information which is linked or […]

How to Use Passwords for Better Cyber Security

Tuesday, May 12th, 2015

Passwords have been the pillar of computer security longer than anyone can remember. In today’s world, however, passwords can add little to no security unless both end users and IT administrators take their implementation seriously. In this article, we will discuss how to create a password that is effective at delaying and deterring the efforts […]

The 6 D’s of Cyber Security Part 2

Tuesday, April 14th, 2015

In last week’s article, we discussed the first 3 D’s of cyber security: Deter, Detect, and Defend. This week, we will discuss the remaining three security concepts that can help you reduce the risk of your organization facing potentially costly incidents due to external threats: Deflect, Document, and Delay. Deflect Wouldn’t it be nice if […]

The 6 D’s of Cyber Security Part 1

Tuesday, April 7th, 2015

In this two-part series we will discuss the 6 D’s of cyber security and how you can implement them in your own cyber defense strategy. This week we look at Deter, Detect, and Defend. Creating a holistic approach to your cyber security plan using these 6 references can drastically reduce your organization’s risk. Deter Creating […]

How Marketers Can Prepare for a Cyber Security Crisis

Tuesday, March 31st, 2015

Do you have a cyber security plan? What happens when a corporate social media account is hijacked for mischief or political gain? Or when sexually explicit Tweets are accidentally published because corporate account access was mismanaged? In an ever-evolving cyber security climate where we hear about a new corporate breach almost every day, brands are […]

Large Organization Employee Threat Assessment

Tuesday, February 17th, 2015

Despite the popular image of the hacker cracking distant servers from his basement, studies show that people with legitimate access to your information pose an even bigger threat. And when information is stolen from within, it’s often harder to trace and determine the extent of the problem. The larger your organization, the more is the […]

Lessons from the Sony Hack: Prioritize Privileged Account Management

Tuesday, December 23rd, 2014

CNN recently reveled the methodology of the cyber attack that allowed anonymous cyber criminals Guardians of Peace direct access to their network, or the “keys to the entire building,” as one Sony Pictures Entertainment official stated. According to investigators, the attack was carried out through a set of stolen system administrator credentials; a privileged account username […]

Secret Server is the enterprise password management software that IT Admins and Security Pros love!

Try it FREE for 30 Days