+1-202-802-9399 U.S. Headquarters

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Articles in the ‘Best Practices’ Category

SSH Key Management: why you should never manage SSH keys manually

December 5th, 2017

Has your organization moved beyond simple user name and password schemes for accessing Unix and Linux systems by relying on SSH keys to allow access? If so, congratulations! You have greatly increased your overall security posture. However, if your organization is managing SSH keys manually, you have a long way to go before you can…


Stop storing cleartext credentials in the registry for Point of Sale systems

November 30th, 2017

Do you want to enable auto logon on your PoS systems without compromise? Do you need to enable auto logon for a seamless buying experience for your customers, but you’re doing it in an unsecure way? Well, Thycotic’s Secret Server has the answer, with complete automation, and without storing credentials in cleartext. Let’s talk about…


A fresh coat of paint over rust does not reduce complexity or improve customer experience

November 29th, 2017

I have been in the industry for a long time with more than 25 years’ experience in building proven security products, and sharing my cybersecurity knowledge, to help companies reduce the risk against cyber threats. One thing I have found in this vast evolving cybersecurity industry is that complexity and security do not mix, if…


Majority of Companies are failing at cyber security metrics, and investing blindly

November 22nd, 2017

Thycotic has released the research results from its Security Measurement Index survey. The resulting “2017 State of Cyber Security Metrics Annual Report“ identifies how companies worldwide are measuring the effectiveness and success of their cyber security strategy. The report is far from comforting Companies and governments world-wide are often just one click or one password…


Taking the Anxiety out of Service Account Management

November 14th, 2017

“Service Account Management” is a deceptively simple term for a process that can be full of uncertainty and justifiable fears. Service Accounts can be the Active Directory accounts attached to your Windows Services, Scheduled Tasks, Application Pools, and more mission critical services that keep your organization operating and in business. The mere thought of having…


NYS DFS 23 NYCRR PART 500: What is it and when is the compliance deadline?

November 9th, 2017

What is DFS 23 NYCRR PART 500? 23 NYCRR PART 500 is a regulation that establishes cybersecurity requirements for financial services companies. The concept of cybersecurity is nothing new, and regulations or compliance mandates around cybersecurity are nothing new either.  At its core, cybersecurity is all about protecting your organization’s data and network from malicious…


Protecting Critical Infrastructure from Cyber Threats

November 1st, 2017

Today we are truly living in the world of IoT—the Internet of things—with approximately 9 billion things, or devices, connected to the internet, many of which are powering and enabling our critical infrastructure. Every day billions of employees power up their devices and connect to the internet to plug into their everyday world, all of…


Cyber Security Awareness Month: Cyber Security in the Workplace is Everyone’s Responsibility

October 10th, 2017

Cyber security is no longer just a technology challenge—it’s a challenge for everybody who uses and interacts with technology daily. That means: everybody in your organization. Cyber security is no longer just the responsibility of the IT department The protection and security of employees’ work and personal lives are no longer separate. They have been…


The Anatomy of a Privileged Account Hack: everything you need to know to protect your organization

October 6th, 2017

Not all hacks, or data breaches, are equal. While many breaches result in inconvenience and minor financial losses, others have the potential to devastate your organization’s finances, credibility, privacy, ability to meet compliance, and much more. A privileged account hack falls into the second category. Our white paper, The Anatomy of a Privileged Account Hack,…


Cyber Security Awareness Month: 6 Simple Steps to Online Safety

October 3rd, 2017

Why do we continue to see so many cyber breaches in spite of our heightened awareness?  When we examine why many of the breaches in recent years have occurred, we can identify three major culprits: the Human Factor, Identities and Credentials, and Vulnerabilities. As a digital social society we are sharing more information publicly, causing…