+1-202-802-9399 U.S. Headquarters

Thycotic’s Cybersecurity Publication

FEATURED STORY:
5 Shocking Insights into the Social Network Habits of Security Professionals 

Hacking social media accounts has never been easier. Attackers take advantage of poor password hygiene and usually hijack an account and hold it for ransom. It’s difficult to get the real picture, but according to Facebook, accounts are hacked 600,000 times a day. And even worse, 80% of all cyber security attacks involve a weak or stolen password.

Filter by Tags: 

Ransomware: Threats, Impact and Expert Recommendations on How to Defend Against It

May 15th, 2017

The massive ransomware infection that spread across computers in over 99 countries on Friday, May 12th 2017, crippling hospitals and businesses, demonstrated how devastating a cyber attack can be on a global level. The timing of this ransomware attack is no coincidence, as many European organizations were wrapping up their day, only to find out…


Part 1: How did my password get hacked? It’s simple…

May 11th, 2017

I wish that we could tell you that the reason your password and account were hacked was due to some really high tech and sophisticated character in a dark room lit only by a giant panel of computer monitors.  Just like you see on your favorite TV show.  Unfortunately, this isn’t the case. It’s not…


10 Tips to Ensure your Privileged Accounts for IoT are Protected and Secured

May 10th, 2017

Welcome to the world of IoT (Internet of Things) where more and more devices get connected online by the minute, with approximately 9 billion devices connected today.  Every day billions of employees power up their devices and connect to the internet to plug into their everyday world: check the news, receive and respond to emails, chat…


MSPs and IT Providers: The Three Things Every MSP Must Do

May 8th, 2017

Guest post by Ian Trump. Please find his full bio below in the author section. MSPs and IT providers have a problem, and it’s about to get a whole lot worse. By the time you land your third customer, you need to get a grip on three important things: Regular Daily Backup Invoicing and Time…


Cybersecurity Awareness: Empowering Our People

May 5th, 2017

Guest column by SailPoint, the leader in enterprise identity management, brings the Power of Identity to customers around the world. As both an industry pioneer and market leader in identity governance, SailPoint delivers security, operational efficiency and compliance to enterprises with complex IT environments. Author: Darren Rolls Like it or not, when it comes to…


Surprising Takeaways from the 2017 Verizon Data Breach Investigations Report

May 3rd, 2017

2016 was a major year for cyber-crime and disruption, with many major significant data breaches (the presidential elections), the Distributed Denial of Service (DDoS) attacks using a botnet of Internet of Things (IoT), and the biggest data disclosure to date, twice, with Yahoo. This is now the 10th version of the Verizon Data Breach Investigations Report…


Stop Blaming China & Russia for All Your Cyber Attacks Pt. 1

May 1st, 2017

In this two part series we will first debunk the 5 myths of sophisticated cyber attacks and then cover the ‘reality’ behind cyber criminal’s attacks and give you actionable cybersecurity hygiene steps to increase your security.  Cyber-attacks can originate from anywhere, but there appears to be an unabated trend of pointing the finger at either “sophisticated…


Top takeaways from Symantec’s Internet Security Threat Report 2017

April 27th, 2017

The latest release of the Symantec Internet Security Threat Report summarizes the state of cyber threats across the world.  “Symantec maintains one of the world’s most comprehensive vulnerability databases, currently consisting of more than 88,900 recorded vulnerabilities (spanning more than two decades) from 24,560 vendors representing over 78,900 products.” The report raises several key incidents…


FERPA tells you what, but not how: The first step to being compliant today

April 26th, 2017

In the 1970s the US Government introduced the Family Education Rights and Privacy Act (FERPA).  In short, the act provides guidelines and regulations for when and how an academic institute can share student/parent records with those record owners and 3rd parties.  Much like other regulations (such as HIPAA and PCI), technology continues to have a…


How do I protect against ransomware?

April 25th, 2017

“Ransomware” is on the rise using “targeted phishing attacks” and is being used for financial blackmail and poison or corrupt data. No one is excluded from these threats and no company or individual is too small to be a target. Ransomware has become such a threat due to its many variations and its drastic impact in…