Thycotic Telephone Number +1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Articles in the ‘Free How-To Tech Advice’ Category

Change Your Password Day: How to breakup with your password

January 29th, 2019

Do you have that one great password that you love? It’s your go-to when creating a new account. You love it because it’s reliable and usually tied to a fond memory like the street you grew up on, or your childhood pet. Problem is, your favorite password is putting you at risk For many, that…


Up, up and to the Clouds: Cloud Computing 101

January 22nd, 2019

The cloud has always been this mysterious place—many companies embraced it and put everything they could into the cloud, while others watched cautiously from a distance, wondering whether they should do the same. Before taking you on the journey to the cloud, let’s answer the question “What is the cloud, exactly?” Clearly, it’s been a…


How to kick start your least privilege strategy as we begin 2019

January 15th, 2019

As we open 2019, we are expecting the issue of least privilege cybersecurity to become a priority for companies across the spectrum. One of the big reasons, of course, is that 80 percent of breaches today involve the compromise of IT and business user credentials including usernames and passwords.  To combat the exploitation of compromised…


Top 5 Top Cyber Security Predictions for 2019

December 24th, 2018

Cyber security was a major topic in 2018 as the compromise of elections and voting machines was at the top of everyone’s minds. Given the critical impact of the midterm elections on future governance, election security is a major concern. It’s especially concerning after it was demonstrated at DEF CON how voting machines could be…


Lower Risk of PowerShell Vulnerabilities with Privilege Management

November 28th, 2018

PowerShell and other scripting tools are part of an IT professional’s arsenal. They are incredibly powerful, a force multiplier which allows you to automate important or frequently used tasks. The same traits that make these tools a boon for IT pros also make them valuable to malicious actors who can use them to exponentially increase their…


What is Least Privilege? Why you need it and how to get started

November 20th, 2018

Least privilege calls for granting only the minimum permissions required by an end-user, application, service, task or system to perform the jobs they have been assigned. Least privilege is intended to prevent “over-privileged access” by users, applications, or services to help reduce the risk of exploitation without impacting productivity or involving the IT help desk.…


Back to the Basics: Service Account Management 101

November 8th, 2018

Service accounts don’t have to be a nightmare. Get in control now.  Service accounts are typically used in operating systems to execute applications or run programs, either in the context of system accounts (high privileged accounts without any password) or a specific user account, usually created manually or during software installation.  On Unix and Linux…


Why an Enterprise Password Manager is for Everyone from SMBs to Corporations

November 6th, 2018

A simple yet effective way of managing business passwords takes high priority on the wish-list of every organization, big and small. This is evidenced by the sheer volume of people searching Google for “business password manager” every day. But what may surprise you is that no matter the size of your business—you must go beyond…


5 Spooky Privilege Security Mistakes that Will Haunt Your Organization

October 30th, 2018

It’s a dark and stormy night. Suddenly your system locks up. Then you get a message, demanding online payment to release your sensitive data back to you. Unfortunately, this isn’t a Halloween prank. Ransomware is on the rise and organizations of all types are falling victim. Your risk of cyber-attack exponentially increases if you’ve made…


Seven Signs It’s Time to Move On from GPO-Only Privilege Management

September 11th, 2018

Many organizations gravitate towards Group Policy Objects (GPO) for privilege management because it offers enough functionality to get started managing privileges. Yet, as your needs evolve, you may find that you require a privilege management system better suited to a maturing, sophisticated organization. What are some of the warning signs that you need more than…