Phone Number +1-202-802-9399 (US)

Thycotic is now Delinea!

Thycotic’s CyberSecurity Publication


Filter by Tags: 

Articles in the ‘Free How-To Tech Advice’ Category

How to Create an IT Disaster Recovery Plan: The Ultimate Guide

September 20th, 2022

Many organizations today are highly vulnerable to downtime since they lack optimized and reliable disaster recovery plans. In fact, Gartner reports that 72% of organizations are not well-positioned for disaster recovery. Without a robust IT disaster recovery plan in place, businesses risk significant and prolonged operational failure, data loss, and revenue loss.

Conversational Geek teaches you cyber insurance 101

September 6th, 2022

If your business gets hit by a serious cyberattack, is it game over? Thanks to cyber insurance, this doesn’t have to be the case. Cyber insurance, like auto or home insurance, reimburses the policyholder for losses incurred from a cyberattack. Sounds great, right? Well, the issue facing businesses looking to get cyber insurance is that…

Ethical Hacker Tips for Securing the Cloud

August 16th, 2022

Is the cloud safer than traditional on-premise computing environments? Can the cloud be hacked? Is it safer to use the cloud as storage for all things digital? These questions are asked all the time by people inside IT and out.

Privilege Escalation on Linux: When it’s good and when it’s a disaster (with examples)

August 4th, 2022

For authorized users on Linux, privilege escalation allows elevated access to complete a specific task or make system configuration modifications. For example, system administrators may need access to troubleshoot a technical problem, add a user, make configuration changes to an application, or install a program.

Privileged Account Security Simplified | Free eBook

July 19th, 2022

The classic cybersecurity perimeter no longer exists. Today’s cybersecurity is a race against cybercriminals and their expanding networks that have become big business. Ransomware, malware, exploits, and social engineering techniques are constantly evolving, and damages to cybercrime victims are drastically increasing.

Securing Active Directory to Reduce Ransomware Attacks: A Quick Primer

July 12th, 2022

Ransomware attacks are increasing in size and complexity, putting organizations across all industries at risk for account lockouts, extortion attempts, and data loss. In fact, the latest research indicates ransomware attacks are up by 80% year-over-year. In large part, this is because most ransomware families—the code signatures and malicious commands that carry out ransomware attacks—are now…

Passwordless authentication: making the vision a reality

July 5th, 2022

The concept of passwordless authentication has been getting a lot of hype. And for good reason. The human element accounts for most data breaches, with 82% stemming from stolen passwords, phishing, misuse, and errors. The idea that users wouldn’t need to create and remember complex passwords, store them in a password vault, or regularly change…

Secure Remote Access Paradigms Pros and Cons

June 14th, 2022

Remote users expect instant connectivity so they can access the same systems they use when in the office. However, increasingly complex hybrid cloud, multi-cloud, and on-premise infrastructures make remote privileged access more difficult for IT teams to manage and secure using traditional access management techniques. Therefore, enterprises need a flexible, easy-to-use method for secure remote…

Conversational Geek shows you how to contain the blast radius of a server attack

May 31st, 2022

Cybersecurity insiders love jargon. The language in most cybersecurity whitepapers and webinars is just as tangled and opaque as legacy tech in a typical IT environment. That’s why it’s no wonder cyber leaders have such difficulty building a common understanding with other technical teams, business users, and company leadership. It’s also no wonder many people…

Privilege Escalation on Windows: When You Want it and When You Don’t

May 3rd, 2022

Privilege escalation is the process by which a user with limited access to IT systems can increase the scope and scale of their access permissions. For trusted users, privilege escalation allows expanded access for a limited time to complete specific tasks. For example, users may need access to troubleshoot a technical problem, run a quarterly…