
Here’s the bad news, your end users are lazy. You’ve seen it all… sticky notes on computer screens, computers left unlocked while people are out grabbing coffee, and simply not following your corporate security policies at all. Take a look at the latest data form SplashData announcing the 2015 edition of its annual “Worst Passwords…
What does the human brain have to do with Security? And most importantly, what does it have to do with password policies in the enterprise? Understanding how the human brain works (at a high level) can help your create the best Password Policy for your organization. Humans are fallible: we make mistakes and we forget…
The Threat Not only do privileged accounts exist on every network, but they exist on nearly every aspect of it. The router has an administrative login, the database has one, and every workstation has either a local or domain administrator account that can be accessed from it. The reality is that these accounts, if compromised,…
Information Security’s ability to educate and empower employees in their risk management responsibilities is a fundamental element of any business protection strategy. If employees in your company think IT Security is the owner of all security related business risk, you’re in big trouble. IT Security pros are paid to understand the range and depth of…
Updated September 2020 The shocking findings from the groundbreaking report from Thycotic and Cybersecurity Ventures highlight that many companies are not doing enough to protect their privileged accounts from cyber-attacks. In this post, I’ll reveal the findings and provide the information you need to plan and implement a privileged account management strategy for your organization.…
Guest post from Alpha Generation a Thycotic certified partner who specializes in IT distribution with a focus on proactive security in the UK. Privileged accounts are a risk for IT security. Most of us know that already – there’s just no avoiding the facts. Facts like: 45% of hackers say privileged passwords are their most coveted target…
Guest blog post by Bryan Krausen, author of IT Diversified. Thycotic has released yet another free IT tool for Admins in an effort to help them discover where privileged accounts may be utilized within their infrastructure. Utilizing a free tool such as this can be important in many scenarios including: Discovery mechanism for IT staff unfamiliar with the…
WASHINGTON, Feb. 2, 2016 /PRNewswire/ — Thycotic, provider of privileged account management solutions for more than 7,500 organizations world-wide, today announced that Privileged Accounts Discovery for Windows is now being offered for free. Designed with security pros, IT management and C-level executives in mind, the tool provides one collection point for all Windows privileged accounts, generates…
Privileged accounts are a favorite target for hackers—it’s critical that your organization’s IT Admins have a password protection policy in place to prevent attacks. So Thycotic and Information Shield partnered to create an easy-to-use, free password security policy template for organizations that do not yet have an official privileged account management policy. Don’t have a…