+1-202-802-9399 U.S. Headquarters

Thycotic’s Cybersecurity Publication

Ransomware goes into stealth mode: 7 things you can do to protect yourself

Ransomware is a destructive variant of malicious malware. It makes critical systems and sensitive information inaccessible until a ransom is paid. Ransom is typically demanded in bitcoin with a 72 hour window to pay before the key is deleted and data is irreversibly lost. Now, it has evolved. Here’s how you protect your organization from the losses suffered in a ransomware attack.

Filter by Tags: 

Fortune 100 IAM Expert Shares their PAM Strategy at Gartner IAM 2016

November 22nd, 2016

Cyber attacks are increasing in sophistication and frequency. Traditional cyber security methods simply aren’t enough anymore; Privileged Account Management (PAM) has got to be a priority at any organization committed to data and customer security. Don’t just take our word for it! Why PAM from IAM experts Join us at Gartner IAM to hear how

Protect Endpoints from Malware using Deny-First Whitelisting

November 16th, 2016

Malware is on the rise, and shows no signs of slowing. According to the AV-TEST Institute: • Through September 2016, nearly 600 Million different types of malware exist • Over 140 Million new types of malware are created every year • Over 11 Million new types of malware are discovered every month Traditional anti-virus and

How to meet FISMA Compliance in 9 Steps

November 16th, 2016

Any organization that maintains a computer network is vulnerable to outside attacks.  Even if it is a single computer in someone’s home, break-in attempts are constant with hackers automatically pinging addresses (including your home router) looking for cracks they can sneak through.  At home, it’s bad enough that the exposure is your personal data including

Thanks to IoT, the Internet is Entering the Wild West 3.0…

November 16th, 2016

By now last week’s historic Internet outage that shut down access to some of the most popular consumer websites—PayPal, Pinterest, Reddit, Spotify, the New York Times, Twitter among an estimated 1192 others—is old news. For anyone who isn’t up to date, it is believed that hackers leveraged tens of thousands of Internet of Things (IoT)

Everything you need to know about Secret Server’s New Add-on Modules

November 3rd, 2016

It’s time to boost your Secret Server productivity with our new add-on modules created to give you the customization and features your organization needs. Save time and effort while increasing your security when you enhance your Thycotic Secret Server solution with any of these integrated add-on modules. Choose which edition you currently use or are

The risks of Critical Infrastructure and IoT from DDOS attacks that could bring the Internet to a standstill

November 1st, 2016

Welcome to the world of IoT (Internet of Things). More and more devices get connected online every day with approximately 9 billion devices already in use.  With weak or almost no security, these devices can easily fall victim and get turned into a BOT which can then be controlled and used to participate in a DDOS

Protecting your network by implementing Least Privilege Policy

October 27th, 2016

Cyber breaches and ransomware are a global epidemic. According to SANS: • 44% admitted one or more of their endpoints had been compromised in the past 24 months. • 85% of reported breaches involved desktops, 68% involved laptops, and 55% involved servers. • The most common type of data compromised (49%) was login and access

What’s Your ‘App’-titude this Cyber Security Awareness Month?

October 25th, 2016

Our lives are more connected online than ever before, with more than 3.5 billion Internet users worldwide—just under half the population on earth. That includes 6 billion email accounts, 2 billion smartphones, 1 billion Apple users, 1 billion Gmail accounts, 1.7 billion Facebook accounts, and 300 million Twitter accounts who tweet 7,350 times per second,

INTERVIEW: Expansion Plans to the APAC Region

October 20th, 2016

It has been less than a year since Simon Azzopardi joined the Thycotic team as Vice President of EMEA and APAC and we’ve already seen significant growth to our world-class two-tier channel program. His leadership and business strategy of signing on the top security partners, leading international teams, and increasing market share and profits has

5 Steps to Recognizing and Combating Cyber Crime

October 18th, 2016

Recognizing and combating cyber crime is one of the most talked about topics in the media and in the boardroom in recent years. It is a major problem and challenge for many companies with the average dwell time (average time before a company detects a cyber breach) being more than 200 days’ highlights this as