+1-202-802-9399 U.S. Headquarters

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘Education’

Cyber Security Awareness Month: Cyber Security in the Workplace is Everyone’s Responsibility

October 10th, 2017

Cyber security is no longer just a technology challenge—it’s a challenge for everybody who uses and interacts with technology daily. That means: everybody in your organization. Cyber security is no longer just the responsibility of the IT department The protection and security of employees’ work and personal lives are no longer separate. They have been…


Come to our 3rd annual UNLOCKED conference in Washington, DC this October

July 7th, 2017

Thycotic is hosting our 3rd annual UNLOCKED conference in Washington, DC this October, and we want YOU to join us! Here are the top 5 reasons you should attend. 1. Get your hands dirty The best way to learn is to do it yourself, right? Especially when you can try new things and not worry…


How Does Encryption Work?

June 12th, 2017

Before we get started, I want to call out something very specific. We are going to cover encryption today, and not salting or hashing.  These are two different things that are often associated together when storing things like passwords in a secure manner.  A Quick Overview of Encryption Encryption at its core basis is a…


An Introduction to Business Networks 101

June 2nd, 2017

If you’re exploring getting into network administration, either for your personal education (such as a college degree) or as a career change, you’re in the right place.  When it comes to understanding the more complex aspects of network administration, such as cyber security, it’s best to start at the beginning. In order to learn how…


FERPA tells you what, but not how: The first step to being compliant today

April 26th, 2017

In the 1970s the US Government introduced the Family Education Rights and Privacy Act (FERPA).  In short, the act provides guidelines and regulations for when and how an academic institute can share student/parent records with those record owners and 3rd parties.  Much like other regulations (such as HIPAA and PCI), technology continues to have a…


A Cloud-First Strategy

March 14th, 2017

Guest column by Mike Somerville originally posted on Ed TechDigest on February 16, 2017 As Manager of Systems Support and Chief Cloud Evangelist, I lead the IT systems team at the University of San Diego. We’re responsible for four data centers, the network, virtualization, servers, and more—everything that needs a password for access. Automating Privileged…


Universities under Attack—Securing student, faculty, and staff’s personal information

February 10th, 2015

Understanding the Size of the Education Industry Sometimes, businesses find out about a data breach the hard way – this was the case for Butler University in May 2013. Police investigating a case of identity theft in California discovered a flash drive on one of their suspects that contained the personally identifiable information (PII) of…