Phone Number +1-202-802-9399 (US)

Thycotic is now Delinea!   delinea.com

Thycotic’s CyberSecurity Publication

[popular_categories]

Filter by Tags: 

Posts Tagged ‘For IT Admins’

Jumpstart Your 2022 Security Resolutions by Trying the Latest Version of Secret Server

January 11th, 2022

Whew, we made it. 2022. After a somewhat rocky 2021—and 2020 for that matter—what’s on your New Year’s Resolution list? Does your list include some of those perennial promises, like “get in shape” or “save money”? Or maybe you’ve got your sights set on some new ones like, “whittle down those streaming subscriptions,” or “use…


The 7 Deadly Privileged Accounts You MUST Discover, Manage, and Secure

December 14th, 2021

Privileged accounts and privileged access are at the heart of every business today. They ensure that the IT team can administer and manage the organization’s systems, infrastructure, and software, and they enable employees to access the data that enables them to make critical business decisions. Not only are most businesses dependent on privileged accounts, but they…


Back to Basics: Service Account Management 101

November 23rd, 2021

Service accounts don’t have to be a nightmare. Get them under control now. Service accounts are typically used in operating systems to execute applications or run programs, either in the context of system accounts (high privileged accounts without any password) or a specific user account, usually created manually or during software installation.  On Unix and…


The Password Spreadsheet: Why NOT to store your passwords in Excel

October 14th, 2021

Is your organization still using an Excel password spreadsheet to store and manage sensitive passwords—the keys to your kingdom? You’re not alone. But storing privileged account passwords and credentials in an Excel spreadsheet poses a serious security risk. Excel was never intended to be a password manager, so there’s no chance it’s ever going to…


What Small Businesses Need to Know About Cyber Security and Password Management

September 7th, 2021

Small to medium businesses (SMBs) made tough choices this past year to keep their business running. Staff scattered to work from home—unexpectedly—and SMBs had to quickly enable them with tools and support to stay connected. Many small companies were forced to sacrifice cyber security best practices in favor of business productivity, increasing their risk of…


Approval Workflows and Notifications for Busy People

August 31st, 2021

Maybe it's happened to you. You deleted a service account because it didn’t seem like any processes were tied to it. And then something broke. Privilege management mistakes happen—but they don’t have to. Setting up an end-to-end workflow for privileged account governance decreases the risk of mistakenly pulling the plug on an important process. The…


Six Questions Secret Server Answers in the Latest Updates

August 17th, 2021

You asked and we answered. We’ve been listening to questions Secret Server customers ask and working hard to make the industry’s top PAM solution even better. We’re excited to share a batch of updates to Secret Server that address your top concerns. 1. Is it possible to get rid of secrets and related data after…


Give Your Cyber Security Career a Boost

August 3rd, 2021

While the shortage of qualified cyber security professionals continues to grow exponentially and ransomware attacks grab international headlines, many mid-career IT professionals with cyber security job experience are evaluating their options. Maybe a year of working remotely has given you pause to think about your career goals and take some time to learn new skills.…


How to Vacation Safely, Without Increasing Your Cyber Security Risk

July 6th, 2021

The combination of pandemic lockdowns and remote work has led to a stockpile of unspent PTO. With vaccination rates increasing and travel restrictions lifting, people are starting to use their vacation days in droves. But that doesn’t mean hackers -- or their bots -- are taking time off.  (Side note: Criminal hackers really should take time off. They’ve been working…


Azure Sentinel Now Integrates with Secret Server for Better Visibility and Faster Incidence Response

May 25th, 2021

Complex, dynamic organizations often have dozens of platforms to manage, each monitoring a different aspect of the security stack. Many Microsoft shops use Azure Sentinel as the single source of truth for security logging. Sentinel aggregates data from multiple security solutions and automates much of the noise away so that security teams can focus on…