+1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Articles in the ‘Cyber Smart’ Category

CYBER SMART: What does CISC stand for?

December 9th, 2016

Question of the Week: What does CISC stand for? Answer: Complex Instruction Set Computing The acronym stands for “Complex Instruction Set Computing” which is a type of microprocessor design. The design gives single instructions and executes low-level operations, but also has the capability to do multi-step operations all within a single instruction. The goal has since…


CYBER SMART: What new virus is making a big comeback?

December 2nd, 2016

Question of the Week: What new virus is making a big comeback? Answer: Shamoon Virus It’s back and back with a vengeance. According to reports, the Shamoon malware contained embedded credentials that allowed the malware to move throughout the network and cause harm. To learn more about the virus and securing your enterprise read this blog.  Are…


CYBER SMART: What does PII stand for?

November 23rd, 2016

Question of the Week: What does PII stand for? Answer: Personal Identifiable Information Personal Identifiable Information defined by Wikipedia is, “Information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context.” This information is highly targeted by hackers so it…


CYBER SMART: How much does fraud cost the world each year?

November 18th, 2016

Question of the Week: How much does fraud cost the world each year? Answer: $3.7 trillion This Fraud Awareness Week we want to bring attention to the importance of fraud prevention. Each year fraud costs the world a staggering $3.7 trillion. How can you get involved? The Association of Certified Fraud Examiners has put together a…


CYBER SMART: How many organizations still rely on manual methods to manage privileged accounts?

November 10th, 2016

Question of the Week: How many organizations still rely on manual methods to manage privileged accounts? Answer: 60% New benchmark global survey shows Privileged Account Management a top security priority, but failing in enforcement. The 2016 State of PAM Report, based on the survey, highlights the major areas of concern including that 60% of organizations still…


CYBER SMART: How many organizations don’t require approval for creating new Privileged Accounts?

November 3rd, 2016

Question of the Week: How many organizations don’t require approval for creating new Privileged Accounts? Answer: 70% New benchmark global survey shows Privileged Account Management a top security priority, but failing in enforcement. The 2016 State of PAM Report, based on the survey, highlights the major areas of concern including that 70% of organizations do not require…


CYBER SMART: What is the most expensive computer virus of all time?

October 28th, 2016

Question of the Week: What is the most expensive computer virus of all time? Answer: MyDoom The estimated cost of the MyDoom virus has come to a staggering $38.5 billion! When it launched in January 2014 it became the fastest spreading email worm ever. The author has never been identified, but it appears to have originated…


CYBER SMART: What is the fastest growing area of crime?

October 21st, 2016

Question of the Week: What is the fastest growing area of crime? Answer: Cyber Crime Did you know that cyber crime is up 20% from 2014? Andrew Gorgdon, PwC’s global and UK forensics leader commented on the recent incline stating, “While the prevalence of traditional fraud – such as asset misappropriation – has fallen since…


CYBER SMART: How many reported breaches involve compromised endpoints?

October 14th, 2016

Question of the Week: How many reported breaches involve compromised endpoints? Answer: 85% The landscape is changing. Traditional antivirus and anti-malware blacklisting can’t keep up with the new and advanced threats targeting desktops, laptops, and servers.  85% of reported breaches involve compromised endpoints according to SANS. It’s critical to have endpoints locked down and application…


CYBER SMART: What type of malware limits users from accessing their systems until a ransom is paid?

September 30th, 2016

Question of the Week: What type of malware limits users from accessing their systems until a ransom is paid? Answer: Ransomware Ransomware is becoming more prevalent today than ever before. This type of malware will restrict users from accessing critical information on their computers, or devices until a set ransom is paid for by the victim.…