Phone Number +1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Articles in the ‘Free Tools’ Category

What Small Businesses Need to Know About Cyber Security and Password Management

September 7th, 2021

Small to medium businesses (SMBs) made tough choices this past year to keep their business running. Staff scattered to work from home—unexpectedly—and SMBs had to quickly enable them with tools and support to stay connected. Many small companies were forced to sacrifice cyber security best practices in favor of business productivity, increasing their risk of…


Cyber Incident Response Checklist and Plan: Are You Breach-Ready?

May 27th, 2021

It’s not rare to see cyber-attacks in the daily news. From ransomware to data breaches to DDoS (Distributed Denial of Service) attacks, the incident is usually attributed to either cybercriminals or nation-states, and almost always comes from beyond our own country’s borders and laws. Because of this, we worry about clicking on a web page…


Privileged Access Management Analytics: Make Your Data Work for You

May 4th, 2021

When time is a resource you don’t have — you must make your data work for you. IT teams face an ever-evolving and expanding environment compounded by a shifting remote workforce, increase in BYOD policies, expansion of the attack surface, and pivot towards the cloud. Users and endpoints have left the office and are now…


See Where You Place in the PAM Maturity Model

December 11th, 2018

Many companies aren’t sure how to begin their PAM implementation or which security activities have the most impact on their goals. To help you stay on course, Thycotic has developed the first PAM Maturity Model, based on industry best practices that systematically lower privileged account risk, increase business agility and improve operational efficiency. The model…


Six Key Differences Between Password Management Tools and PAM

September 4th, 2018

In the past, Privilege Access Management (PAM) was accessible only to large enterprises with skilled IT teams. Feature-heavy PAM tools became more and more complex and expensive to manage. Meanwhile, security-conscious small and medium businesses were relegated to using password tools designed primarily for consumers. While consumer password tools provide a “password vault” to store…


Hacking the US Elections: How Government Agencies Can Protect Themselves

August 24th, 2018

The US midterm elections campaigns are well under way and expected to be held on Tuesday, November 6, 2018.  This midterm election is significant as it will take place right in the middle of President Trump’s first term and will likely be an indicator of the US citizens’ confidence in both the President and the…


Cyber criminals don’t want to be found—a Privilege Detective using Thycotic’s free Least Privilege Discovery Tool

July 10th, 2018

Cyber criminals don’t want to be found. They play a great game of hide and seek, and in many companies—no one is doing any seeking. Instead, they hope that their security perimeter is holding strong, typically relying on traditional cyber security controls that are usually outdated and, for most cyber criminals, easily bypassed using phishing…


Why Knowledge is Power In PAM

June 7th, 2018

Guest post from Alpha Generation a Thycotic certified partner who specializes in IT distribution with a focus on proactive security in the UK. As you’d expect, we think the right technology is a critical part of IT security. Tools for Privileged Account Management (PAM) are a vital addition to your security stack, protecting against threats that firewalls and antivirus…


5 Free Encryption Tools You Can Use Today to Protect Yourself!

January 3rd, 2018

Author Note:  These are all 3rd party tools that have been recommended to me by peers and experts in the field.  With that said, Thycotic does NOT endorse any of these: please explore and use at your own risk.  Email Encryption Tool OpenPGP – An open source encryption protocol used by many clients for providing…


PAM Risk Assessment: your first step to better privileged access control

December 12th, 2017

These days Privileged Access Management and Privileged Account Management (PAM) are interchangeable terms that get a lot of attention. There’s a reason why PAM is fast becoming a top-of-mind cybersecurity issue:  up to 80% of cybersecurity breaches are associated with the abuse or misuse of privileged account credentials. And these credentials readily give hackers or…