Phone Number +1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication


Filter by Tags: 

Articles in the ‘Uncategorized’ Category

CYBER SMART: What is the fastest growing area of crime?

October 21st, 2016

Answer: Cyber Crime Did you know that cyber crime is up 20% from 2014? Andrew Gorgdon, PwC’s global and UK forensics leader commented on the recent incline stating, “While the prevalence of traditional fraud – such as asset misappropriation – has fallen since 2014, there has been a huge rise in organisations reporting cyber crime,…

CYBER SMART: How many reported breaches involve compromised endpoints?

October 14th, 2016

Answer: 85% The landscape is changing. Traditional antivirus and anti-malware blacklisting can’t keep up with the new and advanced threats targeting desktops, laptops, and servers.  85% of reported breaches involve compromised endpoints according to SANS. It’s critical to have endpoints locked down and application access controlled and secured with least privilege policies that do not…

CYBER SMART: What type of malware limits users from accessing their systems until a ransom is paid?

September 30th, 2016

Question of the Week: What type of malware limits users from accessing their systems until a ransom is paid? Answer: Ransomware Ransomware is becoming more prevalent today than ever before. This type of malware will restrict users from accessing critical information on their computers, or devices until a set ransom is paid for by the victim.…

CYBER SMART: What is the name of the process in which information is aggregated to detect suspicious activities?

September 23rd, 2016

Answer: SIEM (Security information and event management) Security Information and Event Management provides a holistic view of data and technology on a network. The process gathers all of the information and allows you to see it from one point of view in order to see patterns and events that are out of the ordinary. Are you using SIEM today?…

CYBER SMART: Which industry has the highest risk of a cyber attack?

September 16th, 2016

Answer: Healthcare According to IBM’s 2016 Cyber Security Intelligence Index the healthcare industry is found to be most affected by cyber attacks. The report also found over 100 million healthcare records were exposed last year alone.There is strong motivation for the healthcare industry to start spending on cyber security defenses. Are you an InfoSec trivia guru? Each Friday…

CYBER SMART: What type of attack impersonates both parties to access info?

September 9th, 2016

Answer: Man-in-the-Middle Attack Watch out! This attack allows a malicious actor to alter or relay information between two parties who believe they are communicating directly with each other. It is also known as a type of “Eavesdropping” attack. Learn about other types of cyber attacks and the ABCs of Cybersecurity here.   Are you an…

CYBER SMART: How many passwords were leaked in the Dropbox hack?

September 2nd, 2016

Question of the Week: How many passwords were leaked in the Dropbox hack? Answer: 68 million passwords Dropbox has confirmed that over 68 million passwords were leaked on the internet. It is believed that these passwords were obtained in a breach four years ago, but they were just released to the internet this week. Dropbox…

CYBER SMART: Where did system virtual machines grow out of?

August 26th, 2016

Answer: Time-sharing The evolution of the virtual machine all started out of time-sharing which was implemented in the Compatible Time-Sharing System. Time-sharing was before it’s time allowing multiple users to use a computer concurrently. If you got the answer right, you must be a virtualization pro! Don’t miss Thycotic at VMworld 2016 in Las Vegas and be…

Win Big in Vegas Without Hitting the Casino with Thycotic at VMworld 2016

August 23rd, 2016

Thycotic attends VMworld 2016 next week with some fantastic prizes and giveaways you can’t miss! Be sure to visit booth #738 for 3 chances to win $1,000 and visit our Thycotic website to learn more about our free security tools and Identity Access Management solutions. Grab to win $1,000: Pop by booth #738 and grab…

CYBER SMART: What is the hacking technique used by attackers to authenticate using underlying NTLM?

August 19th, 2016

Answer: Pass the Hash Pass the Hash is a very popular attack that takes just minutes to escalate. When successful, an attacker can capture a password hash for a domain admin account instantly. Once the hash is compromised, it can be used to move horizontally across the network, giving the attacker access to whatever that…