Phone Number +1-202-802-9399 (US)

ThycoticCentrify is now Delinea!   delinea.com

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Articles in the ‘Free How-To Tech Advice’ Category

Privilege Escalation on Windows: When You Want it and When You Don’t

May 3rd, 2022

Privilege escalation is the process by which a user with limited access to IT systems can increase the scope and scale of their access permissions. For trusted users, privilege escalation allows expanded access for a limited time to complete specific tasks. For example, users may need access to troubleshoot a technical problem, run a quarterly…


AD Bridging: If you’re only using it for authentication, you’re missing a ton of value

April 26th, 2022

There’s no way around it—enterprise networks today are hybrid with Windows, Linux, and UNIX systems in multiple clouds, leaving IT and IT Sec teams with the daunting task of managing access. For many years, Active Directory Bridging has helped by enabling users to log in to non-Windows systems with their enterprise Active Directory account. However,…


Mandatory MFA Everywhere: The Benefits of Stronger Authentication for Cloud Environments

April 19th, 2022

One of the biggest security threats today is the risk of compromised credentials and misuse of privileged accounts. Organizations of all sizes and verticals recognize the need to protect access to their applications, servers, and infrastructures. However, it is often hard to distinguish between a legitimate admin presenting a legitimate ID and password versus a…


How to Curb Shadow IT and Technical Debt to Reduce Cyber Risk

March 15th, 2022

These days, IT departments need to track an ever-growing number of devices and accounts. Once you lose track of the services that employees are using, you end up with shadow IT and technical debt—two issues that can lead to serious security blunders and excess spending. Keep reading for an overview of shadow IT and technical debt—and…


Seamless Server Security for a Hybrid IT Environment

February 22nd, 2022

Servers are the areas of the enterprise attack surface with the greatest risk. That’s where the crown jewels live. They house protected health information, credit card transactions, and intellectual property. All manners of sensitive data are found on servers. And yet, many organizations have insufficient server security.


7 Steps to Recognize and Combat Cyber Crime

January 4th, 2022

Recognizing and combating cyber crime This is one of the most talked-about topics in the media and in the boardroom in recent years. It is a major problem and challenge for many organizations. The average dwell-time (average time before a company detects a cyber breach) is more than 200 days, highlighting this as an area…


The 7 Deadly Privileged Accounts You MUST Discover, Manage, and Secure

December 14th, 2021

Privileged accounts and privileged access are at the heart of every business today. They ensure that the IT team can administer and manage the organization’s systems, infrastructure, and software, and they enable employees to access the data that enables them to make critical business decisions. Not only are most businesses dependent on privileged accounts, but they…


Back to Basics: Service Account Management 101

November 23rd, 2021

Service accounts don’t have to be a nightmare. Get them under control now. Service accounts are typically used in operating systems to execute applications or run programs, either in the context of system accounts (high privileged accounts without any password) or a specific user account, usually created manually or during software installation.  On Unix and…


Cloud Security Best Practices Checklist

November 2nd, 2021

Transitioning to the cloud is one of the most significant technology shifts your company will face. Over 80% of organizations operating in the cloud have experienced at least one compromised account each month, stemming from external actors, malicious insiders, or unintentional mistakes. The specifics of cloud security activities may vary depending on your cloud platforms…


Ransomware Mitigation: Where Do We Go From Here?

October 19th, 2021

Following recent headlines surrounding cyber security, it’s reasonable to conclude that ransomware has rapidly become one of the biggest global threats our businesses and institutions face today. These attacks—which infiltrate our networks, lock up critical data, and demand a substantial ransom in cryptocurrency to restore vital information—have reached crisis proportions, especially in areas like healthcare and…