+1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Articles in the ‘Uncategorized’ Category

CYBER SMART: What does CISC stand for?

December 9th, 2016

Question of the Week: What does CISC stand for? Answer: Complex Instruction Set Computing The acronym stands for “Complex Instruction Set Computing” which is a type of microprocessor design. The design gives single instructions and executes low-level operations, but also has the capability to do multi-step operations all within a single instruction. The goal has since…


CYBER SMART: What new virus is making a big comeback?

December 2nd, 2016

Answer: Shamoon Virus It’s back and back with a vengeance. According to reports, the Shamoon malware contained embedded credentials that allowed the malware to move throughout the network and cause harm. To learn more about the virus and securing your enterprise read this blog.  Are you an InfoSec trivia guru? Each Friday we’ll test your InfoSec knowledge!…


CYBER SMART: What does PII stand for?

November 23rd, 2016

Question of the Week: What does PII stand for? Answer: Personal Identifiable Information Personal Identifiable Information defined by Wikipedia is, “Information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context.” This information is highly targeted by hackers so it…


Fortune 100 IAM Expert Shares their PAM Strategy at Gartner IAM 2016

November 22nd, 2016

Cyber attacks are increasing in sophistication and frequency. Traditional cyber security methods simply aren’t enough anymore; Privileged Account Management (PAM) has got to be a priority at any organization committed to data and customer security. Don’t just take our word for it! Why PAM from IAM experts Join us at Gartner IAM to hear how…


CYBER SMART: How much does fraud cost the world each year?

November 18th, 2016

Question of the Week: How much does fraud cost the world each year? Answer: $3.7 trillion This Fraud Awareness Week we want to bring attention to the importance of fraud prevention. Each year fraud costs the world a staggering $3.7 trillion. How can you get involved? The Association of Certified Fraud Examiners has put together a…


CYBER SMART: How many organizations still rely on manual methods to manage privileged accounts?

November 10th, 2016

Answer: 60% New benchmark global survey shows Privileged Account Management a top security priority, but failing in enforcement. The 2016 State of PAM Report, based on the survey, highlights the major areas of concern including that 60% of organizations still rely on manual methods to manage privileged accounts. Even more surprising is that only 10% have…


CYBER SMART: How many organizations don’t require approval for creating new Privileged Accounts?

November 3rd, 2016

Answer: 70% New benchmark global survey shows Privileged Account Management a top security priority, but failing in enforcement. The 2016 State of PAM Report, based on the survey, highlights the major areas of concern including that 70% of organizations do not require approval for creating new Privileged Accounts. Download the full report here. Are you an InfoSec…


CYBER SMART: What is the most expensive computer virus of all time?

October 28th, 2016

Question of the Week: What is the most expensive computer virus of all time? Answer: MyDoom The estimated cost of the MyDoom virus has come to a staggering $38.5 billion! When it launched in January 2014 it became the fastest spreading email worm ever. The author has never been identified, but it appears to have originated…


CYBER SMART: What is the fastest growing area of crime?

October 21st, 2016

Answer: Cyber Crime Did you know that cyber crime is up 20% from 2014? Andrew Gorgdon, PwC’s global and UK forensics leader commented on the recent incline stating, “While the prevalence of traditional fraud – such as asset misappropriation – has fallen since 2014, there has been a huge rise in organisations reporting cyber crime,…


CYBER SMART: How many reported breaches involve compromised endpoints?

October 14th, 2016

Answer: 85% The landscape is changing. Traditional antivirus and anti-malware blacklisting can’t keep up with the new and advanced threats targeting desktops, laptops, and servers.  85% of reported breaches involve compromised endpoints according to SANS. It’s critical to have endpoints locked down and application access controlled and secured with least privilege policies that do not…