+1-202-802-9399 U.S. Headquarters

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Articles in the ‘Best Practices’ Category

Cyber Security Awareness Month: Cyber Security in the Workplace is Everyone’s Responsibility

October 10th, 2017

Cyber security is no longer just a technology challenge—it’s a challenge for everybody who uses and interacts with technology daily. That means: everybody in your organization. Cyber security is no longer just the responsibility of the IT department The protection and security of employees’ work and personal lives are no longer separate. They have been…


The Anatomy of a Privileged Account Hack: everything you need to know to protect your organization

October 6th, 2017

Not all hacks, or data breaches, are equal. While many breaches result in inconvenience and minor financial losses, others have the potential to devastate your organization’s finances, credibility, privacy, ability to meet compliance, and much more. A privileged account hack falls into the second category. Our white paper, The Anatomy of a Privileged Account Hack,…


Cyber Security Awareness Month: 6 Simple Steps to Online Safety

October 3rd, 2017

Why do we continue to see so many cyber breaches in spite of our heightened awareness?  When we examine why many of the breaches in recent years have occurred, we can identify three major culprits: the Human Factor, Identities and Credentials, and Vulnerabilities. As a digital social society we are sharing more information publicly, causing…


How one of the most well known cyber security organizations in the world benefited from privileged account management

September 26th, 2017

Any Privileged Account Management (PAM) solution that you purchase, whether it’s from Thycotic or elsewhere, is nothing more than a tool to help you secure your infrastructure.  That’s a key thing to remember, because as a tool it will not do the job for you, nor suddenly make your organization secure if you do not…


Most Companies Worldwide Fail to Measure Cybersecurity Effectiveness and Performance

September 20th, 2017

More than half the 400 respondents in a survey from the Thycotic-issued study, “2017 State of Cybersecurity Metrics Report”, scored an F or a D grade after evaluating their organization’s efforts to measure their cybersecurity investments and performance against best practices. 58% received an F or D grade Joseph Carson of Thycotic: “It’s astonishing to…


Don’t Let Malware Hit You on the Way Out

September 19th, 2017

Guest column by Semperis. Author: Noa Arias, Director of Marketing at Semperis When it comes to the threat of data breach, it’s well known that current employees can be an organization’s weakest link. What about former employees? So many companies have strict new hire processes in place to onboard new employees, but there’s still a…


Top 5 privileged account security reports CISOs must have: What Privileged Account passwords are expiring this week?

August 31st, 2017

How do you know when a password is about to be changed according to an assigned password rotation interval? Or when a privileged account or any other item stored within your privileged account management tool is reaching the end of its validation period and needs to be renewed? In this exclusive 5-part Thycotic educational series…


Top 5 privileged account security reports CISOs must have: What is the status of your privileged account password policy compliance?

August 28th, 2017

Do you know an IT security professional who would NOT want an at-a-glance view of all the credentials being managed by their privileged account management tool, and absolute assurance that they adhere to the organization’s assigned policy requirements? I think not. In this exclusive 5-part Thycotic educational series we outline the privileged account security reports…


SANS 2017 Threat Landscape: highlights of the cyber threat survey

August 24th, 2017

The latest SANS 2017 Threat Landscape Survey has been released—the theme of the survey is ‘Users on the Front Line’. In summary, the survey results indicate that Endpoints and Users are on the front line in the battle against cyber threats. This reiterates Thycotic’s message that the traditional cyber security perimeter is no longer the…


Passwords and Biometrics. Can they coexist, and should they?

August 23rd, 2017

The vision of a biometrics-led future for IT security is breathtaking, but is there a place in the future for passwords? Or are passwords ancient history? Passwords Need Better Management, Not Replacement Forget your passwords. They’re ancient history. That’s the message you’ll increasingly see if you keep up with the latest developments in security. But…