Thycotic will be closed on Monday, May 30, 2016 for Memorial Day.
Contact Us +1-202-802-9399 U.S. Headquarters

Archive for the ‘Best Practices’ Category

How to Use Passwords

Tuesday, May 12th, 2015

Passwords have been the pillar of computer security longer than anyone can remember. In today’s world, however, passwords can add little to no security unless both end users and IT administrators take their implementation seriously. In this article, we will discuss how to create a password that is effective at delaying and deterring the efforts […]

The 6 D’s of Cyber Security Part 2

Tuesday, April 14th, 2015

In last week’s article, we discussed the first 3 D’s of cyber security: Deter, Detect, and Defend. This week, we will discuss the remaining three security concepts that can help you reduce the risk of your organization facing potentially costly incidents due to external threats: Deflect, Document, and Delay. Deflect Wouldn’t it be nice if […]

The 6 D’s of Cyber Security Part 1

Tuesday, April 7th, 2015

In this two-part series we will discuss the 6 D’s of cyber security and how you can implement them in your own cyber defense strategy. This week we look at Deter, Detect, and Defend. Creating a holistic approach to your cyber security plan using these 6 references can drastically reduce your organization’s risk. Deter Creating […]

How Marketers Can Prepare for a Cyber Security Crisis

Tuesday, March 31st, 2015

Do you have a cyber security plan? What happens when a corporate social media account is hijacked for mischief or political gain? Or when sexually explicit Tweets are accidentally published because corporate account access was mismanaged? In an ever-evolving cyber security climate where we hear about a new corporate breach almost every day, brands are […]

The Top Three Ways Personally Identifiable Information is Leaked in Healthcare

Tuesday, March 3rd, 2015

Personally identifiable information (PII) related to healthcare data is 50x more valuable on the black market than credit card data according to Alert Logic. Forty three percent of all identity thefts in the United States in 2013 were accounted to medical related identity theft (Logic, 2014). The healthcare industry knows they need to protect PII. It’s […]

Large Organization Employee Threat Assessment

Tuesday, February 17th, 2015

Despite the popular image of the hacker cracking distant servers from his basement, studies show that people with legitimate access to your information pose an even bigger threat. And when information is stolen from within, it’s often harder to trace and determine the extent of the problem. The larger your organization, the more is the […]

Lessons from the Sony Hack: Prioritize Privileged Account Management

Tuesday, December 23rd, 2014

CNN recently reveled the methodology of the cyber attack that allowed anonymous cyber criminals Guardians of Peace direct access to their network, or the “keys to the entire building,” as one Sony Pictures Entertainment official stated. According to investigators, the attack was carried out through a set of stolen system administrator credentials; a privileged account username […]

3 Tips to Stay Safe Shopping this Holiday Season

Tuesday, December 16th, 2014

The holidays are here, and so are many tempting sales from the nation’s largest retailers. Despite the recent trend of data breaches we have seen among consumer companies like Target and Home Depot, we doubt that will slow down 2014’s holiday shoppers. No matter where you shop, use these three tips to stay safe. Use […]

Haunting Tale: Beware of the Insider

Tuesday, October 28th, 2014

We all love October for the fall nights, changing leaves, hot cider and Halloween festivities. October is also National Cyber Security Awareness Month supported by the National Cyber Security Alliance. Although we preach cyber security best practices all year, it’s an important reminder to stay safe online. In support of National Cyber Security Awareness Month […]

[VIDEO] What You Need to Know About Bash Bug

Tuesday, October 7th, 2014

We’ve all heard the headlines of the most recent security bug, including, ‘Shellshock bug could threaten millions compared to Heartbleed,’ or even more terrifying, ‘Shellshock: A deadly new vulnerability that could lay waste to the internet.’ While these headlines are a bit dramatic, there lies some truth in the statements. The National Institute for Standards […]

Secret Server is the enterprise password management software that IT Admins and Security Pros love!

Try it FREE for 30 Days