+1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘Education’

Why Knowledge is Power In PAM

June 7th, 2018

Guest post from Alpha Generation a Thycotic certified partner who specializes in IT distribution with a focus on proactive security in the UK. As you’d expect, we think the right technology is a critical part of IT security. Tools for Privileged Account Management (PAM) are a vital addition to your security stack, protecting against threats that firewalls and antivirus…


What Every CISO Wants Their Employees to Know About Cybersecurity

May 15th, 2018

CISO’s have an incredibly important role to fill. One of their biggest responsibilities is empowering employees to recognize and understand how to respond to cyber attacks they face in their daily work and personal lives. With cybersecurity fatigue, it can be difficult to decide which information to focus us. In this video, you will learn…


Cyber Security Awareness Month: Cyber Security in the Workplace is Everyone’s Responsibility

October 10th, 2017

Cyber security is no longer just a technology challenge—it’s a challenge for everybody who uses and interacts with technology daily. That means: everybody in your organization. Cyber security is no longer just the responsibility of the IT department The protection and security of employees’ work and personal lives are no longer separate. They have been…


Come to our 3rd annual UNLOCKED conference in Washington, DC this October

July 7th, 2017

Thycotic is hosting our 3rd annual UNLOCKED conference in Washington, DC this October, and we want YOU to join us! Here are the top 5 reasons you should attend. 1. Get your hands dirty The best way to learn is to do it yourself, right? Especially when you can try new things and not worry…


How Does Encryption Work? A Look at Symmetric and Asymmetric Encryption

June 12th, 2017

Today we're talking about encryption, but not salting or hashing, even though the two are often associated with one another when storing things like passwords in a secure manner. They are actually very different, and this post focuses on encryption. A Quick Overview of Encryption Encryption is a method of turning data into a form…


An Introduction to Business Networks 101

June 2nd, 2017

If you’re exploring getting into network administration, either for your personal education (such as a college degree) or as a career change, you’re in the right place.  When it comes to understanding the more complex aspects of network administration, such as cyber security, it’s best to start at the beginning. In order to learn how…


FERPA tells you what, but not how: The first step to being compliant today

April 26th, 2017

In the 1970s the US Government introduced the Family Education Rights and Privacy Act (FERPA).  In short, the act provides guidelines and regulations for when and how an academic institute can share student/parent records with those record owners and 3rd parties.  Much like other regulations (such as HIPAA and PCI), technology continues to have a…


A Cloud-First Strategy

March 14th, 2017

Guest column by Mike Somerville originally posted on Ed TechDigest on February 16, 2017 As Manager of Systems Support and Chief Cloud Evangelist, I lead the IT systems team at the University of San Diego. We’re responsible for four data centers, the network, virtualization, servers, and more—everything that needs a password for access. Automating Privileged…


Universities under Attack—Securing student, faculty, and staff’s personal information

February 10th, 2015

Understanding the Size of the Education Industry Sometimes, businesses find out about a data breach the hard way – this was the case for Butler University in May 2013. Police investigating a case of identity theft in California discovered a flash drive on one of their suspects that contained the personally identifiable information (PII) of…