+1-202-802-9399 U.S. Headquarters

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘For IT Admins’

The Top 5 PAM Tasks IT Teams Must Automate Part 2: Changing Network Passwords

June 21st, 2017

Automating Network Password Changing: A password that remains the same year in and year out is a hacker’s dream, and a breach waiting to happen. Fortunately, there are tools that can force users to change passwords after a set period of time, and can automate password changing to protect privileged accounts. In this 5-part Thycotic…


The Top 5 PAM Tasks IT Teams Must Automate Part 1: Privileged Account Discovery

June 16th, 2017

Automating Privileged Account Discovery: The first rule of Information Security says, “You can’t protect what you don’t know you have.” In other words, you could be harboring a hacker as we speak. Let’s examine how automation can be used to discover, catalog and protect the privileged accounts on your network. In this 5-part Thycotic educational…


MSPs and IT Providers: The Three Things Every MSP Must Do

May 8th, 2017

Guest post by Ian Trump. Please find his full bio below in the author section. MSPs and IT providers have a problem, and it’s about to get a whole lot worse. By the time you land your third customer, you need to get a grip on three important things: Regular Daily Backup Invoicing and Time…


Easy read to get your staff and stakeholders up to speed on Privileged Account Management security

April 4th, 2017

We’re constantly fighting an awareness battle in getting IT professionals and business stakeholders to appreciate the urgency associated with securing Privileged Account credentials. With so many high-profile breaches accomplished through the compromise of user passwords and escalation to access privileged accounts, security pros and IT directors are looking for simple ways to educate people throughout…


Ransomware in Real Life

March 28th, 2017

Ransomware – you hear about in the office, even on the evening news since attackers have become creative in this newer threat invention. Everyone’s talking about it, so, what is it? Ransomware is a type of malicious software designed to block access to a computer system until a sum of money is paid – usually…


The Password Spreadsheet: why you must NOT store enterprise passwords in Excel

December 6th, 2016

Is your organization still using an Excel password spreadsheet to store and manage sensitive passwords—the keys to your kingdom? You’re not alone. But storing privileged account passwords and credentials in a spreadsheet poses a serious security risk. There should be no such thing as a ‘password spreadsheet’ Excel was never intended to be a password…


Announcing the IRONMIN IT Admin of the Year Contest 2016

April 5th, 2016

I’m thrilled to announce the launch of Thycotic’s very first IRONMIN IT Admin of the Year contest to recognize all of you outstanding IT administrators! We don’t want your endless hours of hard work and dedication to go unnoticed so we decided to host a contest to showcase your achievements. We are in the search…


New Website: Top 5 New Pages You’ll Love!

January 5th, 2016

New Year, new website! We are extremely excited to announce Thycotic.com’s new and improved look to help you solve your privileged account management problems faster! Redesigned with you in mind, our goal was to create an interactive experience to allow you to easily navigate and learn about our solutions to help secure your business. While…


Thycotic Announces Secret Server Express: Free Privileged Account Management for IT Admins

December 7th, 2015

December 7, 2015 – Washington, D.C. – Thycotic, provider of privileged account management solutions for over 3,500 organizations world-wide, today announced that Secret Server Express is now being offered for free. The solution enables IT admins to secure privileged accounts quickly and easily in a centralized repository, and can downloaded directly from Thycotic’s website. Try…


10 Must-Follow InfoSec Bloggers of 2015

November 12th, 2015

Want to stay up to date on the latest information security trends, breaches, and discoveries? We searched across the deep web to find the top bloggers who live and breathe information security. It’s these amazing security experts who make your life easier by keeping you up to date on the latest InfoSec news and research.…