+1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Articles in the ‘Best Practices’ Category

Top 10 Keys to Successful Least Privilege Adoption Via Application Control

February 15th, 2018

Gone are the days when a security team could select a new tool, turn it on, and expect everyone in the organization to adjust. When security hinders the business, the business fights back. Users now have numerous ways they can work around security tools and policies to get their job done. Least privilege is a…


Top 5 Ways to Win your CEO/CTOs Heart

February 13th, 2018

In today’s always-connected world it’s important to realize that, historically and traditionally, cybersecurity was the responsibility of the IT department. Any time a cyber incident or data breach occurred or security questions arose, these got deferred to IT for the answers. Failure to translate cyber risk into business risk has left many businesses clueless But…


Which of your endpoints is most likely to let an attacker inside?

February 6th, 2018

Is your organization trying to reduce the risk of malware or ransomware in 2018?  Knowing where to start can be the hardest part.  The following risk factors can increase the odds of a cyber attack, and being aware of them can help you focus on and secure your most vulnerable endpoints. Any machine that users…


Data Privacy Day: Where has privacy gone, and will we ever get it back?

January 26th, 2018

Privacy is gone, but never forgotten. Can our current path even be reversed? Yes, the end of privacy as we know it is closer than you may think.  Privacy definitions are very different between nation states and cultures, though one common thread is that privacy is becoming less of an option for most citizens, globally.…


Why is least privilege the place to start for endpoint security?

January 23rd, 2018

Because it will save you time and money.   Your end user’s computers are increasingly exploited as an attack vector used to attain accounts with local administrator rights on Windows or root access on Mac OS. There are a lot of solutions that promise malware detection and prevention. And you can buy more and more software to try to prevent these…


Cyber Security Responsibilities: Who owns your organization’s PAM Policy Template?

January 16th, 2018

Who is responsible for creating, implementing and overseeing your organization’s Privileged Account Management Policy template? And what is at risk if no individuals or departments are named to ensure that your users and systems are in compliance with your PAM Policy? Let’s get the easy part out of the way: if your organization has its…


The #1 priority for improving cybersecurity? Implementing a Privileged Account Management Cycle approach!

January 5th, 2018

In a white paper released in October 2017 by analyst firm KuppingCole, Martin Kuppinger makes the case for why companies need to pay more attention to privileged account protection at all levels. Entitled, “Protecting the keys to your kingdom against cyber-attacks and insider threats,” he points out that Privileged Account Management is far more than…


Cyber Security: What we’ve learned in 2017 to get ready for 2018

December 26th, 2017

Well, it’s been a very interesting year with a few surprises along the way, but as expected, cyber crime grew, financial impact was huge and many companies struggled to recover. Cyber attacks will be the biggest threat to every person and business on earth Cyber security is quickly becoming part of everyone’s daily life and…


MSPs at Risk: You are at serious risk if you are not properly managing your clients’ credentials

December 20th, 2017

I ask MSPs: How secure are the clients’ passwords you manage today? As an MSP you must meet special security needs because you hold critical privileged passwords, not only your own organization, but for your clients’ as well. Do you have an accurate answer for these questions, or are there some unknowns in your organization?…


Privileged Password 101: What exactly is it?

December 15th, 2017

As the total universe of passwords will likely grow to more than 300 billion by 2020, people and organizations across the world face a massively growing cyber security risk from hacked or compromised user and privileged accounts—sometimes a single password being the only security control preventing cyber criminals from gaining access to the victim’s sensitive…