+1-202-802-9399 U.S. Headquarters

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Articles in the ‘Best Practices’ Category

Ransomware in Real Life

March 28th, 2017

Ransomware – you hear about in the office, even on the evening news since attackers have become creative in this newer threat invention. Everyone’s talking about it, so, what is it? Ransomware is a type of malicious software designed to block access to a computer system until a sum of money is paid – usually […]


A Cloud-First Strategy

March 14th, 2017

Guest column by Mike Somerville originally posted on Ed TechDigest on February 16, 2017 As Manager of Systems Support and Chief Cloud Evangelist, I lead the IT systems team at the University of San Diego. We’re responsible for four data centers, the network, virtualization, servers, and more—everything that needs a password for access. Automating Privileged […]


U Behave Yourself… or consider User Behavior Analytics

March 9th, 2017

Get a load of this: an alarming 57 percent of Americans believe that they know as much, or more, about cybersecurity as their IT Directors, according to a comprehensive survey conducted on behalf of Blumberg Capital. This same group of individuals reported that keeping their work passwords secure (10 percent) is only a little more […]


Phishing Scams: Your Social Media and Email Security Checklist

March 2nd, 2017

Phishing scams are on the rise, and they surge during tax season. Phishing is the practice of sending a potential victim an email or message that looks like legitimate correspondence from the IRS,  a bank, or an organization, but clicking on links within the message takes the victim to a fake website. Once on the website (which often also […]


Cloudbleed – Could this be the worst security event in history?

February 27th, 2017

First and foremost – Thycotic does not use Cloudflare for any of our cloud based products, such as Secret Server Cloud or our upcoming Privileged Behavior Analytics. We don’t anticipate our customers being affected by this directly, unless passwords used to access our services are the same as passwords used to access affected websites. It’s […]


Ransomware goes into stealth mode: 7 things you can do to protect yourself

February 27th, 2017

Ransomware is a very destructive variant of malicious malware that makes critical systems and sensitive information inaccessible until a ransom is paid. Ransom is typically demanded in bitcoin with a 72 hour window to pay before the key is deleted and data is irreversibly lost. Some variants have started deleting data before the 72 hours […]


The Password Love Affair: Would you share your password with your partner?

February 14th, 2017

Passwords, for many people and companies, are one of the vital security controls that protect us from external hackers and cyber threats. Passwords are part of everyday life and protect our privacy and sensitive information from unauthorized access. Every day billions of people power up their devices and connect to the internet to access online […]


The Password Spreadsheet: why you must NOT store enterprise passwords in Excel

December 6th, 2016

Is your organization still using an Excel password spreadsheet to store and manage sensitive passwords—the keys to your kingdom? You’re not alone. But storing privileged account passwords and credentials in a spreadsheet poses a serious security risk. There should be no such thing as a ‘password spreadsheet’ Excel was never intended to be a password […]


Shamoon Cyber Attack Reinforces the Need for Privileged Password Security

December 2nd, 2016

According to reports, the Shamoon malware contained embedded credentials that allowed the malware to move throughout the network and cause harm. The attack was likely initiated using a worm, which is how Shamoon operated historically. Propagation occurs by accessing shares in the network or through other remote access, using stolen credentials. The pattern of privileged […]


The risks of Critical Infrastructure and IoT from DDOS attacks that could bring the Internet to a standstill

November 1st, 2016

Welcome to the world of IoT (Internet of Things). More and more devices get connected online every day with approximately 9 billion devices already in use.  With weak or almost no security, these devices can easily become a victim and turned into a BOT which can then be controlled and used to participate in a […]