+1-202-802-9399 U.S. Headquarters

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Articles in the ‘Top 10s’ Category

Need an IAM Solution? Make Sure It Has the Right Foundation

April 19th, 2017

Guest column by SailPoint, the leader in enterprise identity management, brings the Power of Identity to customers around the world. As both an industry pioneer and market leader in identity governance, SailPoint delivers security, operational efficiency and compliance to enterprises with complex IT environments. In today’s highly distributed IT world, where organizations must secure a […]


The biggest Insider Threats and 5 steps federal agencies must take to reduce IT Security Risk

April 17th, 2017

NISPOM defines insider threat as “Anyone with authorized access to government resources that uses that access to do harm to the security of the U.S.” In the government space, both agencies, contractors, and IT staff will typically have a high level of privileged access. In some cases, they have specialized clearance levels so they can […]


Phishing Scams: Your Social Media and Email Security Checklist

March 2nd, 2017

Phishing scams are on the rise, and they surge during tax season. Phishing is the practice of sending a potential victim an email or message that looks like legitimate correspondence from the IRS,  a bank, or an organization, but clicking on links within the message takes the victim to a fake website. Once on the website (which often also […]


Ransomware goes into stealth mode: 7 things you can do to protect yourself

February 27th, 2017

Ransomware is a very destructive variant of malicious malware that makes critical systems and sensitive information inaccessible until a ransom is paid. Ransom is typically demanded in bitcoin with a 72 hour window to pay before the key is deleted and data is irreversibly lost. Some variants have started deleting data before the 72 hours […]


Top 4 Password Blunders And How Thycotic Can Help

January 24th, 2017

Satisnet Ltd Guest Post The fact is that however bad a solution they are, we are all stuck using passwords and will be for the foreseeable future. Here are the typical bad password practices I see when I’ve visited enterprises over recent times. 1. PASSWORD IN SPREADSHEETS, NOTEPAD FILES, NOTEBOOKS, PHOTOS ON PHONES ETC ETC So, what’s […]


Top 3 New Features in Secret Server 10.1

January 18th, 2017

Secret Server 10.1 ushers in some powerful features to not only improve upon its pre-existing repertoire of capabilities but to add to them as well. Firstly, a new level of control over SSH environments: SSH Key Rotation. Secondly, a brand new ability to manage password changing and heartbeat for IBM z/OS RACF accounts: Mainframe Password […]


How to create a stronger security policy in 9 steps

January 10th, 2017

Here’s the bad news, your end users are lazy. You’ve seen it all… sticky notes on computer screens, computers left unlocked while people are out grabbing coffee, and simply not following your corporate security policies at all. Take a look at the latest data form SplashData announcing the 2015 edition of its annual “Worst Passwords […]


10 Tips to begin 2017 as a Secure Enterprise

January 5th, 2017

Cyber Security is a very hot topic and with more than 3.5 billion Internet users worldwide, That includes, 6 billion email accounts, 2 billion smartphones, 1 billion apple users, 1 billion Gmail accounts, 1.7 billion Facebook accounts, and 300 million Twitter accounts who tweet 7,350 times per second, send 2.5 million emails per second, and […]


The Top 5 Applications You Should Blacklist Now

December 13th, 2016

Most organizations regularly deploy and use applications that contain significant vulnerabilities. These vulnerabilities are easily exploited by attackers to access systems and data running on those applications. Many of the vulnerabilities known as CVE’s (Common Vulnerabilities and Exposures) are posted on the National Vulnerability Database to inform IT professionals of the mitigation controls they must […]


How to meet FISMA Compliance in 9 Steps

November 16th, 2016

Any organization that maintains a computer network is vulnerable to outside attacks.  Even if it is a single computer in someone’s home, break-in attempts are constant with hackers automatically pinging addresses (including your home router) looking for cracks they can sneak through.  At home, it’s bad enough that the exposure is your personal data including […]