+1-202-802-9399 U.S. Headquarters

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Articles in the ‘How To & Guides’ Category

How Does Encryption Work?

June 12th, 2017

Before we get started, I want to call out something very specific. We are going to cover encryption today, and not salting or hashing.  These are two different things that are often associated together when storing things like passwords in a secure manner.  A Quick Overview of Encryption Encryption at its core basis is a…


An Introduction to Business Networks 101

June 2nd, 2017

The intent of this post is an introduction for people who are either exploring getting into some sort of network administration, either for your personal education (such as a college degree) or maybe you’re looking to make a career change.  When it comes to understanding more complex aspects, such as cyber security, sometimes it’s best…


Part 2: How did my password get hacked? It’s this easy…

May 24th, 2017

I’ll pick up where we left off in Part 1: How did my password get hacked? That’s where I explained that the reason your account was hacked was probably NOT due to some sophisticated state actor from China or Russia. So to recap, the top three reasons your password was hacked were most likely: You had a different account…


Top Tips: Extend Identity and Access Management to Protect All Privileged Accounts

April 18th, 2017

The traditional security perimeter is proving no longer an effective cyber security control and fast growing technologies like cloud, mobile and virtualization make the boundaries of an organization blurry. For many years, organizations have protected their valuable and sensitive information by building a fence around those assets. All the data following in and out of…


Easy read to get your staff and stakeholders up to speed on Privileged Account Management security

April 4th, 2017

We’re constantly fighting an awareness battle in getting IT professionals and business stakeholders to appreciate the urgency associated with securing Privileged Account credentials. With so many high-profile breaches accomplished through the compromise of user passwords and escalation to access privileged accounts, security pros and IT directors are looking for simple ways to educate people throughout…


Create a strong password security policy in 9 steps

January 10th, 2017

Here’s the bad news, your end users are lazy. You’ve seen it all… sticky notes on computer screens, computers left unlocked while people are out grabbing coffee, and simply not following your corporate security policies at all. Take a look at the latest data form SplashData announcing the 2015 edition of its annual “Worst Passwords…


How to create an Enterprise Password Policy that gets used

January 6th, 2017

Humans are fascinating creatures, and the way we think is intriguing and drives many career paths. But what does the human brain have to do with Security? And most importantly, what does it have to do with Password Policies? Understanding how the human brain works (at a high level) helps understand the best Password Policy…


Infographic: How to Promote Information Security in the Workplace

January 5th, 2017

We were so impressed by the important data presented in this infographic (below) by the University of Alabama at Birmingham that we’re featuring it as a guest blog post. Did you know that the biggest threat to your organization’s data/information security could be you? You, the owner. You, the senior manager. You, the hard working…


Guide: Start Managing the Keys to the Kingdom with Secret Server Cloud in 15 Minutes

September 14th, 2016

How would you like to start protecting your privileged accounts in 15 minutes? I’m happy to announce our new cloud based option for deploying Thycotic Secret Server. With Secret Server Cloud you can get the same features as a premise installation, but running in a hosted environment. What Is Secret Server Cloud? Secret Server Cloud…


Mac Launcher Deep Dive: What You Need To Know

May 10th, 2016

One of the most requested features on our feature vote tracker of all time has been native support for a Mac OSX session launcher with the same capabilities and functionality as the Windows launchers. You asked and we answered, Secret Server 9.0 includes the first version of the Mac launchers. Here’s everything you need to…