Phone Number +1-202-802-9399 (US)

ThycoticCentrify is now Delinea!   delinea.com

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Articles in the ‘Free How-To Tech Advice’ Category

Back to Basics: Service Account Management 101

November 23rd, 2021

Service accounts don’t have to be a nightmare. Get them under control now. Service accounts are typically used in operating systems to execute applications or run programs, either in the context of system accounts (high privileged accounts without any password) or a specific user account, usually created manually or during software installation.  On Unix and…


Cloud Security Best Practices Checklist

November 2nd, 2021

Transitioning to the cloud is one of the most significant technology shifts your company will face. Over 80% of organizations operating in the cloud have experienced at least one compromised account each month, stemming from external actors, malicious insiders, or unintentional mistakes. The specifics of cloud security activities may vary depending on your cloud platforms…


Ransomware Mitigation: Where Do We Go From Here?

October 19th, 2021

Following recent headlines surrounding cyber security, it’s reasonable to conclude that ransomware has rapidly become one of the biggest global threats our businesses and institutions face today. These attacks—which infiltrate our networks, lock up critical data, and demand a substantial ransom in cryptocurrency to restore vital information—have reached crisis proportions, especially in areas like healthcare and…


The Password Spreadsheet: Why NOT to store your passwords in Excel

October 14th, 2021

Is your organization still using an Excel password spreadsheet to store and manage sensitive passwords—the keys to your kingdom? You’re not alone. But storing privileged account passwords and credentials in an Excel spreadsheet poses a serious security risk. Excel was never intended to be a password manager, so there’s no chance it’s ever going to…


Privileged Password Management 101: What exactly is PPM?

October 5th, 2021

Let’s reduce password pain and move passwords into the background Passwords remain one of the top challenges and causes of cyber fatigue for employees. As we move more of our business and lives online this means the number of credentials needed to protect our identities continues to grow. Unfortunately, a single password is sometimes the…


Zero Trust Privilege for PAM Dummies eBook

August 10th, 2021

Security is Broken. Long Live Security. At ThycoticCentrify, cyber security is our bag. We’ve blogged about how identity-based breaches are on the rise, fueled by a perfect storm of conditions that include cloud transformation, an expanding attack surface, and wholesale remote VPN-based access due to the increase in work from home. Businesses worldwide are deploying…


Give Your Cyber Security Career a Boost

August 3rd, 2021

While the shortage of qualified cyber security professionals continues to grow exponentially and ransomware attacks grab international headlines, many mid-career IT professionals with cyber security job experience are evaluating their options. Maybe a year of working remotely has given you pause to think about your career goals and take some time to learn new skills.…


Privilege Elevation for Workstations and Servers

July 13th, 2021

“Start with the end in mind.” That’s how people tell you to face a challenge. While that’s true, the end can sometimes look so far away you feel overwhelmed before you even begin. When that happens, the best thing to do is set small, attainable goals along the way. You can use the same strategy…


Best Practices to Incorporate DevOps in Enterprise Security

June 1st, 2021

It’s impossible to make an organization 100% impenetrable. You may have all the right security policies and tools. But, no matter how quickly you shore up your defenses, cyber criminals just keep getting faster. To avoid becoming the next victim of a cyber attack, you just need to outrun the guy next to you. That’s…


Cyber Incident Response Checklist and Plan: Are You Breach-Ready?

May 27th, 2021

It’s not rare to see cyber-attacks in the daily news. From ransomware to data breaches to DDoS (Distributed Denial of Service) attacks, the incident is usually attributed to either cybercriminals or nation-states, and almost always comes from beyond our own country’s borders and laws. Because of this, we worry about clicking on a web page…