+1-202-802-9399 U.S. Headquarters

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Articles in the ‘Uncategorized’ Category

Win Big in Vegas Without Hitting the Casino with Thycotic at VMworld 2016

August 23rd, 2016

Thycotic attends VMworld 2016 next week with some fantastic prizes and giveaways you can’t miss! Be sure to visit booth #738 for 3 chances to win $1,000 and visit our Thycotic website to learn more about our free security tools and Identity Access Management solutions. Grab to win $1,000: Pop by booth #738 and grab […]


3 Easy Ways to Win at Black Hat 2016

July 26th, 2016

Thycotic attends Black Hat conference August 2016 with some fantastic prizes and giveaways you can’t miss! Be sure to visit booth #1454 for 3 ways to win and visit our Thycotic website to learn more about our free security tools and identity access management solutions. 1.      Grab to win: Pop by booth #1454 and grab [...]


Happy SysAdmin Appreciation Day! Get your ‘Passwords are like Underwear’ Bumper Sticker Gift

July 12th, 2016

No unsung hero of IT will go unnoticed on July 29th, 2016 - SysAdmin Appreciation Day, the most important holiday of the year! We want to thank each and every System Administrator around the world for the countless overtime, endless help desk ticket response, and overall technology wizardship that you seem to magically possess. We [...]


CYBER SMART: What is the estimated global cost of cyber attacks in 2019?

June 24th, 2016

Question of the Week: What is the estimated global cost of cyber attacks in 2019? Answer: $2.1 trillion A recent study by Juniper has predicted that in 2019 the global cost of cyber attacks will be 2019. This prediction is almost four times the estimated cost of breaches in 2015. Are you an InfoSec trivia [...]


CYBER SMART: What percentage of attackers use phishing attacks to steal credentials?

June 17th, 2016

Question of the Week: What percentage of attackers use phishing attacks to steal credentials? Answer: 81.9% of incidents The 2016 Verizon Data Breach Investigations Report has found that hackers use phishing attacks in 81.9% of their attacks most likely due to its speed of which they can steal credentials. Are you an InfoSec trivia guru? Each [...]


CYBER SMART: What is the Highest Paying IT Security Job?

June 10th, 2016

Question of the Week: What is the Highest Paying IT Security Job? Answer: Lead software security engineer With an average of $233,333, a year pay check, Lead software security engineers takes the win for highest paying Information Security career. It's no simple task and takes at least a BS in computer science or related field to apply. [...]


CYBER SMART: How many computers are vulnerable to exploit kits?

June 3rd, 2016

Question of the Week: How many computers are vulnerable to exploit kits? Answer: 99% Out of date Oracle Java, Adobe Reader, or Adobe Flash is on 99% of computers leaving users extremely vulnerable to exploit kits. How does it work? If a user clicks on just one infected advertisement or link a cyber criminal will then have [...]


CYBER SMART: How much does the average ransomware bribe equal?

May 27th, 2016

Question of the Week: How much does the average ransomware bribe equal? Answer: About $500 How much are you willing to pay to gain back control over your data? While the answer is different for everyone and the cost to decrypt a device varies, the cost today averages around $500. Watch out for malvertising and phishing emails and […]


CYBER SMART: What was the top password used by LinkedIn members?

May 20th, 2016

Question of the Week: What was the top password used by LinkedIn members? Answer: 123456 Will users ever learn? Over 117 million LinkedIn emails and passwords from a 2012 hack were posted on Leaked Source revealing hundreds of thousands of LinkedIn users passwords. For InfoSec pros it is no surprise, but the famed 123456 password was the […]


CYBER SMART: When was encryption invented?

March 18th, 2016

Question of the Week:  When was encryption invented? Answer: 1467 In 1467, Leon Battista Alberti invented and published the first polyalphebtic substitution cypher which consisted of two metal discs on an axle which had mixed alphabets and variable rotations. Are you an InfoSec trivia guru? Each Friday we’ll test your InfoSec knowledge! Whether you’re new to […]