+1-202-802-9399 U.S. Headquarters

Thycotic’s Cybersecurity Publication

FEATURED STORY:
5 Shocking Insights into the Social Network Habits of Security Professionals 

Hacking social media accounts has never been easier. Attackers take advantage of poor password hygiene and usually hijack an account and hold it for ransom. It’s difficult to get the real picture, but according to Facebook, accounts are hacked 600,000 times a day. And even worse, 80% of all cyber security attacks involve a weak or stolen password.

Filter by Tags: 

Integration Spotlight – Secret Server and Devolutions Remote Desktop Manager

September 17th, 2013

  In this week’s webinar we will be diving into the integration of Devolutions Remote Desktop Manager and Secret Server. Since the software integration in 2011, users have been securing their credentials through Secret Server and remote connections using Remote Desktop Manager after several client requests. Since then, administrators have been able to use both…


Securing Web Browsers Through Group Policy

September 9th, 2013

When developing a workflow to manage shared credentials, it’s important to take into account certain environmental factors that may cache credentials on their own. These factors can decrease security around shared credentials. Here, we’ll focus on securing your web browsers through group policy. Disable Password Caching for IE Note: these instructions are specific to Windows…


Importing Credentials into Secret Server Part Two of Two

September 3rd, 2013

In our last post we discussed importing secrets manually into Secret Server using our Migration Tool and built in CSV and XML import. This week we are going review how to automatically import credentials into Secret Server. Discovery in Secret Server Discovery is a major feature in Secret Server with two main functions: Scan your…


Importing Credentials into Secret Server Part One of Two

August 28th, 2013

After installing Secret Server and thinking through your Folder and Permission structure, the next step is to import information into Secret Server. Secret Server provides multiple tools to quickly import information into Secret Server, whether you are currently using sticky notes, Excel spreadsheets or a personal password tool such as KeePass. Secret Server can also automatically…


Get Credentials out of Code with Secret Server API

July 16th, 2013

A few years back, our engineers decided to solve a new password problem: Network credentials are not only used by people. Sometimes other programs need credentials to interact with the network too. Secret Server was already providing full audits of each user’s credential usage, why not create an API so programs could also use Secret…


Conventions for Naming Secrets

July 9th, 2013

When first adding Secrets to your Secret Server account, one of your questions might be, “What should I name my Secrets?” This is a great question and one that we recommend thinking about for any new Secret Server customer. Secret names should be descriptive, but should not reveal any sensitive data. An option for Administrators…


Password Requirements in Secret Server

June 28th, 2013

An important part of account security is choosing a strong password to be used to protect the account. The biggest challenge for most users is designing a strong password – one that contains at least eight characters consisting of a mix of upper- and lower-case letters, numbers, and symbols. It can be tedious and time…


Integrating Your Ticketing System in Secret Server

June 14th, 2013

Secret Server can integrate with any web ticketing system. This allows you to tie specific Secret views to an item in your existing ticketing system. It does so by first validating that the ticket number given to Secret Server matches the pattern of your ticketing system. Secret Server will then use the ticket number to…


Customizing Roles For Your Company – Part Two

May 31st, 2013

In Part One of this two-part series we discussed setting custom Roles inside of Secret Server. In this section we will discuss the three ways to set Permissions on Secrets within Secret Server. Roles give a user the ability to perform actions inside Secret Server, whereas Permissions dictate the level of control a user has…


Breaking the Glass With Unlimited Administration Mode

May 28th, 2013

What happens when a user creates Secrets and does not share them with anyone else, or if you are administrating Secret Server and need to re-organize your Secrets? Secret Server’s “break the glass” feature, Unlimited Administration Mode, can help in those situations. The Unlimited Administrator Mode allows designated users to manage Secrets they would normally…