+1-202-802-9399 U.S. Headquarters

Thycotic’s Cybersecurity Publication

FEATURED STORY:
5 Shocking Insights into the Social Network Habits of Security Professionals 

Hacking social media accounts has never been easier. Attackers take advantage of poor password hygiene and usually hijack an account and hold it for ransom. It’s difficult to get the real picture, but according to Facebook, accounts are hacked 600,000 times a day. And even worse, 80% of all cyber security attacks involve a weak or stolen password.

Filter by Tags: 

Phishing Scams: Your Social Media and Email Security Checklist

March 2nd, 2017

Phishing scams are on the rise, and they surge during tax season. Phishing is the practice of sending a potential victim an email or message that looks like legitimate correspondence from the IRS,  a bank, or an organization, but clicking on links within the message takes the victim to a fake website. Once on the website (which often also…


Cloudbleed – Could this be the worst security event in history?

February 27th, 2017

First and foremost – Thycotic does not use Cloudflare for any of our cloud based products, such as Secret Server Cloud or our upcoming Privileged Behavior Analytics. We don’t anticipate our customers being affected by this directly, unless passwords used to access our services are the same as passwords used to access affected websites. It’s…


Ransomware goes into stealth mode: 7 things you can do to protect yourself

February 27th, 2017

Ransomware is a very destructive variant of malicious malware that makes critical systems and sensitive information inaccessible until a ransom is paid. Ransom is typically demanded in bitcoin with a 72 hour window to pay before the key is deleted and data is irreversibly lost. Some variants have started deleting data before the 72 hours…


Privileged Account Management Moves to the Cloud

February 22nd, 2017

How a cloud-first strategy works to secure student data and meet compliance mandates. Guest Column by Mike Summerville, University of San Diego and featured in EdTech Magazine. Automating Privileged Account Password Security As Manager of Systems Support and Chief Cloud Evangelist, I lead the IT systems team at the University of San Diego. We’re responsible for…


The Password Love Affair: Would you share your password with your partner?

February 14th, 2017

Passwords, for many people and companies, are one of the vital security controls that protect us from external hackers and cyber threats. Passwords are part of everyday life and protect our privacy and sensitive information from unauthorized access. Every day billions of people power up their devices and connect to the internet to access online…


Top 4 Password Blunders And How Thycotic Can Help

January 24th, 2017

Satisnet Ltd Guest Post However bad a solution they are, we are all stuck using passwords and will be for the foreseeable future. Here are the typical bad password practices I see when I visit enterprises. 1. PASSWORD IN SPREADSHEETS, NOTEPAD FILES, NOTEBOOKS, PHOTOS ON PHONES ETC ETC So, what’s the problem: it’s password protected, right? WRONG! I…


Big News: UNLOCKED 2017 Official Announcement

January 19th, 2017

Thycotic’s annual conference, UNLOCKED 2017, has been announced, and it’s bigger and better than ever before! We are thrilled to host the third annual conference again in the heart of the nation’s capital on October 19th, 2017. You won’t want to miss the largest Privileged Account Management conference of the year packed into two exciting…


Top 3 New Features in Secret Server 10.1

January 18th, 2017

Secret Server 10.1 ushers in some powerful features to not only improve upon its pre-existing repertoire of capabilities but to add to them as well. Firstly, a new level of control over SSH environments: SSH Key Rotation. Secondly, a brand new ability to manage password changing and heartbeat for IBM z/OS RACF accounts: Mainframe Password…


Create a strong password security policy in 9 steps

January 10th, 2017

Here’s the bad news, your end users are lazy. You’ve seen it all… sticky notes on computer screens, computers left unlocked while people are out grabbing coffee, and simply not following your corporate security policies at all. Take a look at the latest data form SplashData announcing the 2015 edition of its annual “Worst Passwords…


How to create an Enterprise Password Policy that gets used

January 6th, 2017

Humans are fascinating creatures, and the way we think is intriguing and drives many career paths. But what does the human brain have to do with Security? And most importantly, what does it have to do with Password Policies? Understanding how the human brain works (at a high level) helps understand the best Password Policy…