Contact Us +1-202-802-9399 U.S. Headquarters

Archive for the ‘Best Practices’ Category

The 6 D’s of Cyber Security Part 1

Tuesday, April 7th, 2015

In this two-part series we will discuss the 6 D’s of cyber security and how you can implement them in your own cyber defense strategy. This week we look at Deter, Detect, and Defend. Creating a holistic approach to your cyber security plan using these 6 references can drastically reduce your organization’s risk. Deter Creating […]

How Marketers Can Prepare for a Cyber Security Crisis

Tuesday, March 31st, 2015

Do you have a cyber security plan? What happens when a corporate social media account is hijacked for mischief or political gain? Or when sexually explicit Tweets are accidentally published because corporate account access was mismanaged? In an ever-evolving cyber security climate where we hear about a new corporate breach almost every day, brands are […]

The Top Three Ways Personally Identifiable Information is Leaked in Healthcare

Tuesday, March 3rd, 2015

Personally identifiable information (PII) related to healthcare data is 50x more valuable on the black market than credit card data according to Alert Logic. Forty three percent of all identity thefts in the United States in 2013 were accounted to medical related identity theft (Logic, 2014). The healthcare industry knows they need to protect PII. It’s […]

Large Organization Employee Threat Assessment

Tuesday, February 17th, 2015

Despite the popular image of the hacker cracking distant servers from his basement, studies show that people with legitimate access to your information pose an even bigger threat. And when information is stolen from within, it’s often harder to trace and determine the extent of the problem. The larger your organization, the more is the […]

Lessons from the Sony Hack: Prioritize Privileged Account Management

Tuesday, December 23rd, 2014

CNN recently reveled the methodology of the cyber attack that allowed anonymous cybercriminals Guardians of Peace direct access to their network, or the “keys to the entire building,” as one Sony Pictures Entertainment official stated. According to investigators, the attack was carried out through a set of stolen system administrator credentials; a privileged account username and […]

3 Tips to Stay Safe Shopping this Holiday Season

Tuesday, December 16th, 2014

The holidays are here, and so are many tempting sales from the nation’s largest retailers. Despite the recent trend of data breaches we have seen among consumer companies like Target and Home Depot, we doubt that will slow down 2014’s holiday shoppers. No matter where you shop, use these three tips to stay safe. Use […]

Qualys Security Conference 2014: Tension Between Security and IT Operations

Tuesday, November 11th, 2014

In my previous post, ‘Vulnerability Scanning: Is Unauthenticated Scanning Enough?’ I discussed the differences between authenticated and unauthenticated scans, and how Qualys and Thycotic work together to find vulnerabilities for better security. When performing authenticated scans, Qualys uses credentials to find sensitive issues such as malware, patches, incorrect configuration, and other vulnerabilities. It then scans […]

Haunting Tale: Beware of the Insider

Tuesday, October 28th, 2014

We all love October for the fall nights, changing leaves, hot cider and Halloween festivities. October is also National Cyber Security Awareness Month supported by the National Cyber Security Alliance. Although we preach cyber security best practices all year, it’s an important reminder to stay safe online. In support of National Cyber Security Awareness Month […]

[VIDEO] What You Need to Know About Bash Bug

Tuesday, October 7th, 2014

We’ve all heard the headlines of the most recent security bug, including, ‘Shellshock bug could threaten millions compared to Heartbleed,’ or even more terrifying, ‘Shellshock: A deadly new vulnerability that could lay waste to the internet.’ While these headlines are a bit dramatic, there lies some truth in the statements. The National Institute for Standards […]

(Video) Are You Following Password Best Practices?

Tuesday, September 23rd, 2014

As an IT professional you juggle over 100 tasks a day, making sure everyone’s computers are up and running, no disasters are occurring, all while maintaining your entire network’s security. All of your daily responsibilities revolve around passwords and as an administrator you and your team are the keepers of ‘the keys to the kingdom.’ […]

Try Secret Server FREE for 30 Days!