+1-202-802-9399 U.S. Headquarters

Thycotic’s Cybersecurity Publication

FEATURED STORY:
Ransomware goes into stealth mode: 7 things you can do to protect yourself

Ransomware is a destructive variant of malicious malware. It makes critical systems and sensitive information inaccessible until a ransom is paid. Ransom is typically demanded in bitcoin with a 72 hour window to pay before the key is deleted and data is irreversibly lost. Now, it has evolved. Here’s how you protect your organization from the losses suffered in a ransomware attack.

Filter by Tags: 

Use Custom Reports as Your Secret Weapon

December 10th, 2013

Custom Reports While Secret Server contains a number of reports addressing Secrets, folders, users, activity and more, having the flexibility to create your own reports may be necessary to address your organization’s unique requirements. With the Custom Reports feature of Enterprise and Enterprise Plus editions (and a little knowledge of SQL), you can do just


Announcing Our Official Technology Alliance with Splunk

December 3rd, 2013

In the past we have discussed the benefits of using a security information and event management (SIEM) solution, not only as a compliance tool, but also for protecting against potential threats in real time. We are excited to announce our official technology alliance with Splunk to release Secret Server for Splunk Enterprise, giving administrators deep


Password Reset Server: Remind Your Users to Enroll With a Logon Script

November 27th, 2013

Being a self-service password reset tool, Password Reset Server needs its end-users to enroll in the product by answering security questions. This can become a challenge if you want your users to begin changing their password immediately or if you are having difficulty getting users to respond to the enrollment reminders. Password Reset Server offers


Are You Using One Time Passwords?

November 26th, 2013

Secret Server password management software can easily be configured so that end users do not have to see the password to make use of a resource, such as logging onto a remote server. Using Hide Launcher Password, Secret passwords can be hidden from users, forcing them to use a Launcher to access the machine or


Windows 8.1 Security Improvements Helps Protect Against Pass the Hash Attacks

October 21st, 2013

This cyber security month, we’d like to congratulate and thank Microsoft on their efforts to block Pass the Hash Attacks. Known by Microsoft as “one of the most popular types of credential theft and reuse attacks,” Pass the Hash attacks are known for their ability to infiltrate full networks within minutes, making a major mess along


Create an Approval Workflow for Sensitive Secrets

October 15th, 2013

It’s important to understand how to properly create a workflow in Secret Server for secrets of a sensitive nature. For example, let’s say you have a Secret for the admin account on your production web server. You want to give all your web server administrators access to the Secret, but you only want them to


The Value of SIEM and How to Integrate with Secret Server

October 1st, 2013

What is a SIEM tool and why should I use one? SIEM (System Information and Event Management) tools are a type of software that pulls in log and audit information from multiple sources across your network. This can include access logs for building entry, computers, servers, network devices, databases and applications. SIEM tools can aggregate


Using Secret Server to Help Maintain Compliance Mandates

September 24th, 2013

Secret Server is a powerful, flexible tool which can help your organization meet a variety of compliance mandates, such as SOX, PCI, HIPAA and more. In this article we are going to review several ways you can utilize Secret Server to maintain compliance by securely managing your privileged account credentials. Centralizing Your Sensitive Information Before


Integration Spotlight – Secret Server and Devolutions Remote Desktop Manager

September 17th, 2013

  In this week’s webinar we will be diving into the integration of Devolutions Remote Desktop Manager and Secret Server. Since the software integration in 2011, users have been securing their credentials through Secret Server and remote connections using Remote Desktop Manager after several client requests. Since then, administrators have been able to use both


Securing Web Browsers Through Group Policy

September 9th, 2013

When developing a workflow to manage shared credentials, it’s important to take into account certain environmental factors that may cache credentials on their own. These factors can decrease security around shared credentials. Here, we’ll focus on securing your web browsers through group policy. Disable Password Caching for IE Note: these instructions are specific to Windows