
Apple products continue to grow in popularity. With strong iPhone X and 11 sales, Apple is boosting their smartphone market share. And it’s not just consumer products where we’re seeing growth. Enterprises are using Macs more and more and Thycotic is seeing significant growth in these devices and operating systems. Endpoints present a significant security…
WASHINGTON, D.C., September 12, 2019 — Thycotic, provider of privileged access management (PAM) solutions to more than 10,000 organizations, including 20 percent of the Fortune 100, today released research results in a new report entitled, “Hackers & Security Professionals at Black Hat 2019: Where They Agree and Where They Differ.” The report finds service accounts are a…
Automating Network Password Changing: A password that remains the same year in and year out is a hacker’s dream, and a breach waiting to happen. Fortunately, there are tools that can force users to change passwords after a set period of time, and can automate password changing to protect privileged accounts. In this 5-part Thycotic…
Question of the Week: What does CISC stand for? Answer: Complex Instruction Set Computing The acronym stands for “Complex Instruction Set Computing” which is a type of microprocessor design. The design gives single instructions and executes low-level operations, but also has the capability to do multi-step operations all within a single instruction. The goal has since…
Answer: Shamoon Virus It’s back and back with a vengeance. According to reports, the Shamoon malware contained embedded credentials that allowed the malware to move throughout the network and cause harm. To learn more about the virus and securing your enterprise read this blog. Are you an InfoSec trivia guru? Each Friday we’ll test your InfoSec knowledge!…
Question of the Week: What does PII stand for? Answer: Personal Identifiable Information Personal Identifiable Information defined by Wikipedia is, “Information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context.” This information is highly targeted by hackers so it…
Question of the Week: How much does fraud cost the world each year? Answer: $3.7 trillion This Fraud Awareness Week we want to bring attention to the importance of fraud prevention. Each year fraud costs the world a staggering $3.7 trillion. How can you get involved? The Association of Certified Fraud Examiners has put together a…
Answer: 60% New benchmark global survey shows Privileged Account Management a top security priority, but failing in enforcement. The 2016 State of PAM Report, based on the survey, highlights the major areas of concern including that 60% of organizations still rely on manual methods to manage privileged accounts. Even more surprising is that only 10% have…
Answer: 70% New benchmark global survey shows Privileged Account Management a top security priority, but failing in enforcement. The 2016 State of PAM Report, based on the survey, highlights the major areas of concern including that 70% of organizations do not require approval for creating new Privileged Accounts. Download the full report here. Are you an InfoSec…
Question of the Week: What is the most expensive computer virus of all time? Answer: MyDoom The estimated cost of the MyDoom virus has come to a staggering $38.5 billion! When it launched in January 2014 it became the fastest spreading email worm ever. The author has never been identified, but it appears to have originated…