+1-202-802-9399 U.S. Headquarters
Free Trial

Archive for the ‘Best Practices’ Category

Cloudbleed – Could this be the worst security event in history?

Friday, February 24th, 2017

First and foremost – Thycotic does not use Cloudflare for any of our cloud based products, such as Secret Server Cloud or our upcoming Privileged Behavior Analytics. We don’t anticipate our customers being affected by this directly, unless passwords used to access our services are the same as passwords used to access affected websites. It’s […]

Ransomware goes into stealth mode – What you need to know and what you can do!

Tuesday, February 21st, 2017

Ransomware has become a major threat and high risk to many individuals and organizations worldwide. It is a very destructive variant of malicious malware that when it impacts systems it makes critical systems and sensitive information inaccessible until a ransom is paid, typically bitcoins within 72 hours and if unpaid the key to unlocking the […]

The Password Love Affair – Would you share your password with your partner?

Tuesday, February 14th, 2017

Passwords for many people and companies are one of the vital security controls that protect us from external hackers and cyber threats. Passwords are part of everyday life and protect our privacy and sensitive information from unauthorized access. Every day billions of people power up their devices and connect to the internet to access online […]

Top 4 Password Blunders And How Thycotic Can Help

Tuesday, January 24th, 2017

Guest Post from our partners at Satisnet Ltd, the leading IT Security Reseller dedicated to providing the highest level of customer care and technical support. Read the full article here. The fact is that however bad a solution they are, we are all stuck using passwords, and, with few exceptions, they will be for the foreseeable […]

How to create an Enterprise Password Policy that gets used

Friday, January 6th, 2017

Humans are fascinating creatures, and the way we think is intriguing and drives many career paths. But what does the human brain have to do with Security? And most importantly, what does it have to do with Password Policies? Understanding how the human brain works (at a high level) helps understand the best Password Policy […]

CYBER SMART: What does PII stand for?

Wednesday, November 23rd, 2016

Question of the Week: What does PII stand for? Answer: Personal Identifiable Information Personal Identifiable Information defined by Wikipedia is, “Information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context.” This information is highly targeted by hackers so it […]

What’s Your ‘App’-titude this Cyber Security Awareness Month?

Tuesday, October 25th, 2016

Our lives are more connected online than ever before, with more than 3.5 billion Internet users worldwide—just under half the population on earth. That includes 6 billion email accounts, 2 billion smartphones, 1 billion apple users, 1 billion Gmail accounts, 1.7 billion Facebook accounts, and 300 million Twitter accounts who tweet 7,350 times per second, […]

Top 8 Cyber Security Best Practices You Cannot Ignore

Tuesday, October 4th, 2016

With more than 3.5 billion Internet users worldwide, cyber security is a hot topic and implementing best security practices is more important than ever! The sheer volume of accounts available for hacking is jaw dropping: 6 billion email accounts 2 billion Smartphones 1 billion Apple users 1 billion Gmail accounts 1.8 billion Facebook accounts …and […]

Measuring Security Awareness in Your Organization

Monday, September 26th, 2016

Information Security’s ability to educate and empower employees in their risk management responsibilities is a fundamental element of any business protection strategy. If employees in your company think IT Security is the owner of all security related business risk, you’re in big trouble. IT Security pros are paid to understand the range and depth of […]

3 Strategies for Helping CISOs Communicate to The Board of Directors

Tuesday, August 30th, 2016

A CISO’s ability to communicate becomes even more important when trying to get the attention of an executive board. Now that IT security is an essential part of risk management, chief information security officers (CISOs) must effectively present their case to c-level executives in order to articulate risk posture, explain strategy, or get more budget. […]