+1-202-802-9399 U.S. Headquarters

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘For IT Admins’

MSPs and IT Providers: The Three Things Every MSP Must Do

May 8th, 2017

Guest post by Ian Trump. Please find his full bio below in the author section. MSPs and IT providers have a problem, and it’s about to get a whole lot worse. By the time you land your third customer, you need to get a grip on three important things: Regular Daily Backup Invoicing and Time


Easy read to get your staff and stakeholders up to speed on Privileged Account Management security

April 4th, 2017

We’re constantly fighting an awareness battle in getting IT professionals and business stakeholders to appreciate the urgency associated with securing Privileged Account credentials. With so many high-profile breaches accomplished through the compromise of user passwords and escalation to access privileged accounts, security pros and IT directors are looking for simple ways to educate people throughout


Ransomware in Real Life

March 28th, 2017

Ransomware – you hear about in the office, even on the evening news since attackers have become creative in this newer threat invention. Everyone’s talking about it, so, what is it? Ransomware is a type of malicious software designed to block access to a computer system until a sum of money is paid – usually


The Password Spreadsheet: why you must NOT store enterprise passwords in Excel

December 6th, 2016

Is your organization still using an Excel password spreadsheet to store and manage sensitive passwords—the keys to your kingdom? You’re not alone. But storing privileged account passwords and credentials in a spreadsheet poses a serious security risk. There should be no such thing as a ‘password spreadsheet’ Excel was never intended to be a password


Announcing the IRONMIN IT Admin of the Year Contest 2016

April 5th, 2016

I’m thrilled to announce the launch of Thycotic’s very first IRONMIN IT Admin of the Year contest to recognize all of you outstanding IT administrators! We don’t want your endless hours of hard work and dedication to go unnoticed so we decided to host a contest to showcase your achievements. We are in the search


New Website: Top 5 New Pages You’ll Love!

January 5th, 2016

New Year, new website! We are extremely excited to announce Thycotic.com’s new and improved look to help you solve your privileged account management problems faster! Redesigned with you in mind, our goal was to create an interactive experience to allow you to easily navigate and learn about our solutions to help secure your business. While


Thycotic Announces Secret Server Express: Free Privileged Account Management for IT Admins

December 7th, 2015

December 7, 2015 – Washington, D.C. – Thycotic, provider of privileged account management solutions for over 3,500 organizations world-wide, today announced that Secret Server Express is now being offered for free. The solution enables IT admins to secure privileged accounts quickly and easily in a centralized repository, and can downloaded directly from Thycotic’s website. Try


10 Must-Follow InfoSec Bloggers of 2015

November 12th, 2015

Want to stay up to date on the latest information security trends, breaches, and discoveries? We searched across the deep web to find the top bloggers who live and breathe information security. It’s these amazing security experts who make your life easier by keeping you up to date on the latest InfoSec news and research.


Why you are being targeted by cyber criminals & 7 things you can do about it

October 22nd, 2015

Imagine this. You’re a high ranking government officer on your way to classified meeting discussing extremely sensitive details for an operation you’re overseeing. Suddenly, you get an email in your personal account from a friendly colleague who is asking for the list of people that are attending a meeting next week. Without a second thought,


PAM Security Blog Series Part 5: Tips for Implementing Privileged Account Management Solutions

September 8th, 2015

In this video blog series, IT security experts explain why compromised privileged credentials are at the heart of most large-scale cyber-attacks, and how privileged account management can help IT teams mitigate a host of security and compliance issues. Don’t take the boil the ocean approach. Implementing a privileged account management strategy is a foundational element