Thycotic Telephone Number +1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Articles in the ‘Free Tools’ Category

Create a strong password security policy in 9 steps

January 10th, 2017

Here’s the bad news, your end users are lazy. You’ve seen it all… sticky notes on computer screens, computers left unlocked while people are out grabbing coffee, and simply not following your corporate security policies at all. Take a look at the latest data form SplashData announcing the 2015 edition of its annual “Worst Passwords…


How to create an Enterprise Password Policy that gets used

January 6th, 2017

What does the human brain have to do with Security? And most importantly, what does it have to do with password policies in the enterprise? Understanding how the human brain works (at a high level) can help your create the best Password Policy for your organization. Humans are fallible: we make mistakes and we forget…


The Mission of Secret Server Free

November 29th, 2016

The Threat Not only do privileged accounts exist on every network, but they exist on nearly every aspect of it. The router has an administrative login, the database has one, and every workstation has either a local or domain administrator account that can be accessed from it. The reality is that these accounts, if compromised,…


Measuring Security Awareness in Your Organization

September 26th, 2016

Information Security’s ability to educate and empower employees in their risk management responsibilities is a fundamental element of any business protection strategy. If employees in your company think IT Security is the owner of all security related business risk, you’re in big trouble. IT Security pros are paid to understand the range and depth of…


Top 10 Questions to Ask Before Planning Your Privileged Account Management Strategy

August 25th, 2016

The shocking findings from the recent groundbreaking report from Thycotic and Cybersecurity Ventures highlights many companies are not doing enough to protect privileged accounts that are crucial to protecting companies from cyber-attacks. In this blog series we are going to look at some of the key findings so stay tuned. A major metric was that…


Discover the scale of your privileged account risk

July 5th, 2016

Guest post from Alpha Generation a Thycotic certified partner who specializes in IT distribution with a focus on proactive security in the UK. Privileged accounts are a risk for IT security. Most of us know that already – there’s just no avoiding the facts. Facts like: 45% of hackers say privileged passwords are their most coveted target…


Using the Privileged Accounts Discovery Tool

February 9th, 2016

Guest blog post by Bryan Krausen, author of IT Diversified. Find the full article here. Thycotic has released yet another free IT tool for Admins in an effort to help them discover where privileged accounts may be utilized within their infrastructure. Utilizing a free tool such as this can be important in many scenarios including: Discovery mechanism for IT…


Thycotic Launches Free Privileged Accounts Discovery for Windows

February 2nd, 2016

WASHINGTON, Feb. 2, 2016 /PRNewswire/ — Thycotic, provider of privileged account management solutions for more than 7,500 organizations world-wide, today announced that Privileged Accounts Discovery for Windows is now being offered for free. Designed with security pros, IT management and C-level executives in mind, the tool provides one collection point for all Windows privileged accounts, generates…


5 Reasons you’ll love Thycotic’s Free Privileged Password Security Policy Template

November 16th, 2015

Privileged accounts are a favorite target for hackers—it’s critical that your organization’s IT Admins have a password protection policy in place to prevent attacks. So Thycotic and Information Shield partnered to create an easy-to-use, free password security policy template for organizations that do not yet have an official privileged account management policy. Don’t have a…