+1-202-802-9399 U.S. Headquarters

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘Free Stuff’

Integrate the Thycotic Mobile App with Your EMM Solution Instantly

September 28th, 2017

Secure your employee’s BYOD devices before loading Thycotic applications Thycotic has joined forces with AppDome so our customers can easily integrate the Thycotic mobile app with an Enterprise Mobility Management (EMM) solution of their choice. EMM enables IT organizations to manage and secure company data on mobile devices. There are several EMM solutions available including…


SysAdmin Day 2017 is almost here! Choose your bumper sticker now.

July 7th, 2017

Join us in celebrating the best day of the year—System Administrator Appreciation Day 2017! The official SysAdmin Day day isn’t until the 28th – the last Friday of July. But we want to make sure that every sysadmin gets a little thank you from our team. Let’s face it, 364 days out of the year…


5 Shocking Insights into the Social Network Habits of Security Professionals [And Infographic]

May 30th, 2017

It may come to a shock for some of you, but not all security professionals practice what they preach. In a recent survey, the “real” truth came to light around cyber security professionals and their security habits around social media usage. Hacking social media accounts has never been easier. Attackers take advantage of poor password…


Easy read to get your staff and stakeholders up to speed on Privileged Account Management security

April 4th, 2017

We’re constantly fighting an awareness battle in getting IT professionals and business stakeholders to appreciate the urgency associated with securing Privileged Account credentials. With so many high-profile breaches accomplished through the compromise of user passwords and escalation to access privileged accounts, security pros and IT directors are looking for simple ways to educate people throughout…


Create a strong password security policy in 9 steps

January 10th, 2017

Here’s the bad news, your end users are lazy. You’ve seen it all… sticky notes on computer screens, computers left unlocked while people are out grabbing coffee, and simply not following your corporate security policies at all. Take a look at the latest data form SplashData announcing the 2015 edition of its annual “Worst Passwords…


How to create an Enterprise Password Policy that gets used

January 6th, 2017

Humans are fascinating creatures, and the way we think is intriguing and drives many career paths. But what does the human brain have to do with Security? And most importantly, what does it have to do with Password Policies? Understanding how the human brain works (at a high level) helps understand the best Password Policy…


Shamoon Cyber Attack Reinforces the Need for Privileged Password Security

December 2nd, 2016

According to reports, the Shamoon malware contained embedded credentials that allowed the malware to move throughout the network and cause harm. The attack was likely initiated using a worm, which is how Shamoon operated historically. Propagation occurs by accessing shares in the network or through other remote access, using stolen credentials. The pattern of privileged…


The Mission of Secret Server Free

November 29th, 2016

The Threat Not only do privileged accounts exist on every network, but they exist on nearly every aspect of it. The router has an administrative login, the database has one, and every workstation has either a local or domain administrator account that can be accessed from it. The reality is that these accounts, if compromised,…


Discover the scale of your privileged account risk

July 5th, 2016

Guest post from Alpha Generation a Thycotic certified partner who specializes in IT distribution with a focus on proactive security in the UK. Privileged accounts are a risk for IT security. Most of us know that already – there’s just no avoiding the facts. Facts like: 45% of hackers say privileged passwords are their most coveted target…


Using the Privileged Accounts Discovery Tool

February 9th, 2016

Guest blog post by Bryan Krausen, author of IT Diversified. Find the full article here. Thycotic has released yet another free IT tool for Admins in an effort to help them discover where privileged accounts may be utilized within their infrastructure. Utilizing a free tool such as this can be important in many scenarios including: Discovery mechanism for IT…