+1-202-802-9399 U.S. Headquarters

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Articles in the ‘How To & Guides’ Category

Top Tips: Extend Identity and Access Management to Protect All Privileged Accounts

April 18th, 2017

The traditional security perimeter is proving no longer an effective cyber security control and fast growing technologies like cloud, mobile and virtualization make the boundaries of an organization blurry. For many years, organizations have protected their valuable and sensitive information by building a fence around those assets. All the data following in and out of […]


Easy read to get your staff and stakeholders up to speed on Privileged Account Management security

April 4th, 2017

We’re constantly fighting an awareness battle in getting IT professionals and business stakeholders to appreciate the urgency associated with securing Privileged Account credentials. With so many high-profile breaches accomplished through the compromise of user passwords and escalation to access privileged accounts, security pros and IT directors are looking for simple ways to educate people throughout […]


How to create an Enterprise Password Policy that gets used

January 6th, 2017

Humans are fascinating creatures, and the way we think is intriguing and drives many career paths. But what does the human brain have to do with Security? And most importantly, what does it have to do with Password Policies? Understanding how the human brain works (at a high level) helps understand the best Password Policy […]


Infographic: How to Promote Information Security in the Workplace

January 5th, 2017

We were so impressed by the important data presented in this infographic (below) by the University of Alabama at Birmingham that we’re featuring it as a guest blog post. Did you know that the biggest threat to your organization’s data/information security could be you? You, the owner. You, the senior manager. You, the hard working […]


Guide: Start Managing the Keys to the Kingdom with Secret Server Cloud in 15 Minutes

September 14th, 2016

How would you like to start protecting your privileged accounts in 15 minutes? I’m happy to announce our new cloud based option for deploying Thycotic Secret Server. With Secret Server Cloud you can get the same features as a premise installation, but running in a hosted environment. What Is Secret Server Cloud? Secret Server Cloud […]


Mac Launcher Deep Dive: What You Need To Know

May 10th, 2016

One of the most requested features on our feature vote tracker of all time has been native support for a Mac OSX session launcher with the same capabilities and functionality as the Windows launchers. You asked and we answered, Secret Server 9.0 includes the first version of the Mac launchers. Here’s everything you need to […]


Ransomware is a major threat – Learn how to use Least Privilege, Application Whitelisting & Privilege Account Management to reduce risk

May 3rd, 2016

Ransomware has become a major threat due to its many variations and drastic impact on restricting access to systems and data, often making day to day business unavailable and shutting down access to critical systems. Existing perimeter solutions today have failed to detect and prevent Ransomware from infecting and spreading within the organization’s networks creating […]


How to Use Passwords for Better Cyber Security

May 12th, 2015

Passwords have been the pillar of computer security longer than anyone can remember. In today’s world, however, passwords can add little to no security unless both end users and IT administrators take their implementation seriously. In this article, we will discuss how to create a password that is effective at delaying and deterring the efforts […]


3 Tips to Stay Safe Shopping, Online or Off

December 16th, 2014

Despite numerous data breaches we have seen among consumer companies like Target and Home Depot, we doubt that breaches will slow down any time soon. No matter where you shop, use these three tips to stay safe. Use Credit Instead of Debit This may sound like an irresponsible thing to do at first, but the […]


Secret Server: The Getting Started Guide for End-Users

August 12th, 2014

In our recent blog post, Don’t let your company’s social media get hacked: Deploy Secret Server to end-users, you learned about our new Basic User Dashboard and how to administer Secret Server to your end users. We wanted to make getting started with Secret Server simple and straightforward for your end users. Share this blog […]