+1-202-802-9399 U.S. Headquarters

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘Cyber Security’

Part 3: How did my password get hacked? It’s this easy…

June 6th, 2017

This is the 3rd part in a 3-part series on how hackers are using simple methods to steal your passwords. In part 1 we talked about how hackers used passwords that were discovered in a previous breach in order to attempt a secondary breach. In part 2 we talked about the use of malicious scripts…


Part 2: How did my password get hacked? It’s this easy…

May 24th, 2017

I’ll pick up where we left off in Part 1: How did my password get hacked? That’s where I explained that the reason your account was hacked was probably NOT due to some sophisticated state actor from China or Russia. So to recap, the top three reasons your password was hacked were most likely: You had a different account…


Oops! Your files have been encrypted! How to avoid that dreaded Ransomware Message

May 17th, 2017

Even People Who Know Better Fall Prey to Cyber Attacks. After all, it wasn’t a bunch of Facebook junkies or six-year-olds who clicked on the e-mail links that launched WannaCry (also known as WannaDecryptor) ransomware attacks that infected computers in as many as 150 countries. Instead professionals in the workplaces of the world were caught off-guard…


#DontCry with #WannaCry – Do not become the next victim of Ransomware

May 16th, 2017

Ransomware has become a major threat and high risk to many individuals and organizations worldwide. It is a very destructive variant of malicious malware. When it impacts systems it makes critical systems and sensitive information inaccessible until a ransom is paid. Ransom is typically is paid via bitcoins within 72 hours and if unpaid the…


How mature is Australia really, when it comes to cyber security?

May 16th, 2017

Guest blog post by emt Distribution.  According to The Australian Strategic Policy Institutes’ report on Cyber Maturity in the Asia-Pacific Region (2016), Australia is ranked at 4th place, one up from the weighted scores in 2015. Who’s doing better? The US, South Korea, and Japan, followed by Singapore, then New Zealand. So why are we not ranked…


Ransomware: Threats, Impact and Expert Recommendations on How to Defend Against It

May 15th, 2017

The massive ransomware infection that spread across computers in over 99 countries on Friday, May 12th 2017, crippling hospitals and businesses, demonstrated how devastating a cyber attack can be on a global level. The timing of this ransomware attack is no coincidence, as many European organizations were wrapping up their day, only to find out…


Stop Blaming China & Russia for All Your Cyber Attacks Pt. 1

May 1st, 2017

In this two part series we will first debunk the 5 myths of sophisticated cyber attacks and then cover the ‘reality’ behind cyber criminal’s attacks and give you actionable cybersecurity hygiene steps to increase your security.  Cyber-attacks can originate from anywhere, but there appears to be an unabated trend of pointing the finger at either “sophisticated…


How do I protect against ransomware?

April 25th, 2017

“Ransomware” is on the rise using “targeted phishing attacks” and is being used for financial blackmail and poison or corrupt data. No one is excluded from these threats and no company or individual is too small to be a target. Ransomware has become such a threat due to its many variations and its drastic impact in…


Phishing Scams: Your Social Media and Email Security Checklist

March 2nd, 2017

Phishing scams are on the rise, and they surge during tax season. Phishing is the practice of sending a potential victim an email or message that looks like legitimate correspondence from the IRS,  a bank, or an organization, but clicking on links within the message takes the victim to a fake website. Once on the website (which often also…


Cloudbleed – Could this be the worst security event in history?

February 27th, 2017

First and foremost – Thycotic does not use Cloudflare for any of our cloud based products, such as Secret Server Cloud or our upcoming Privileged Behavior Analytics. We don’t anticipate our customers being affected by this directly, unless passwords used to access our services are the same as passwords used to access affected websites. It’s…