+1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Articles in the ‘Uncategorized’ Category

How many breaches have been reported in 2016 so far?

August 5th, 2016

Answer: 522 reported breaches As of July 28th, 2016 there have been over 522 reported breaches according to the Identity Theft Resource Center. Not every breached reported the number of records affected, but there have been over 13 million records confirmed so far in 2016. Check out the 10 biggest data breaches so far over on…


Who is the founder of System Administrator Appreciation Day?

July 29th, 2016

Answer: Ted Kekatos On July 28, 2000 the very first System Administrator Appreciation Day was celebrated thanks to Ted Kekatos. The day was created to celebrate all of the hard work of our System Administrators who go unappreciated throughout the year. This year marks the 16th annual System Administrator Day and at Thycotic we’re celebrating by giving away…


CYBER SMART: Which state became the first to promote the use of public-key infrastructure technology for digitally signing documents?

July 22nd, 2016

Answer: Utah In 1995 Utah was the very first state to address the issue of electronic and digital signatures. They passed the Utah Digital Signature Act of 1995 becoming the very first state to promote use of public-key infrastructure technology for digitally signing documents. Are you an InfoSec trivia guru? Each Friday we’ll test your InfoSec knowledge!…


CYBER SMART: What percentage of cyber attacks can be mitigated by patch management?

July 15th, 2016

Answer: Patch Management can mitigate more than 80% of cyber attacks. A major concern is the ever growing and increasing complexity of patching systems and applications. This is typically more complicated in the retail industry due to distribution, remote access and limited bandwidth available as well as poorly trained end-users operating these technologies. The importance…


Happy SysAdmin Appreciation Day! Get your ‘Passwords are like Underwear’ Bumper Sticker Gift

July 12th, 2016

No unsung hero of IT will go unnoticed on July 29th, 2016 - SysAdmin Appreciation Day, the most important holiday of the year! We want to thank each and every System Administrator around the world for the countless overtime, endless help desk ticket response, and overall technology wizardship that you seem to magically possess. We…


CYBER SMART: How many organizations received a failing grade on the enforcement of proper privileged credential controls?

July 8th, 2016

Answer: 52% of companies received a failing grade We partnered with Cybersecurity Ventures on a report to find out how many organizations would fail on the proper enforcement of privileged credential controls. An alarming 52% of those companies received a failing grade on the enforcement of proper privileged credential controls. Part of the reason may be because…


CYBER SMART: What percentage of data breaches involve weak, default or stolen passwords?

July 1st, 2016

Question of the Week: What percentage of data breaches involve weak, default or stolen passwords? Answer: 63% of confirmed data breaches According to the Verizon 2016 Data Breach Investigations Report 63% of confirmed data breaches involve weak, default or stolen passwords. To learn more about how to protect privileged credentials learn how to automate your credentialed vulnerability…


CYBER SMART: When was the Payment Card Industry Security Standards Council formed?

April 1st, 2016

Question of the Week: When was the Payment Card Industry Security Standards Council formed? Answer: December 15, 2004 The Payment Card Industry Security Standards Council first formed on December 15th, 2004 as five different programs with the same goal in mind, “To create an additional level of protection for card issuers by ensuring that merchants…


Privileged users and data breaches: A match made in heaven?

December 2nd, 2014

With data breaches on the rise, more evidence is constantly being discovered to support the link between privileged accounts in organizations and network breaches. Thycotic and IANS recently conducted a survey of 100 experienced security and IT operations professionals regarding their recent data breaches and privileged account misuse, and the results show there is indeed…


Haunting Tale: Beware of the Insider

October 28th, 2014

We all love October for the fall nights, changing leaves, hot cider and Halloween festivities. October is also National Cyber Security Awareness Month supported by the National Cyber Security Alliance. Although we preach cyber security best practices all year, it’s an important reminder to stay safe online. In support of National Cyber Security Awareness Month…