+1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘Managing Privileged Accounts’

Cyber Security Responsibilities: Who owns your organization’s PAM Policy Template?

January 16th, 2018

Who is responsible for creating, implementing and overseeing your organization’s Privileged Account Management Policy template? And what is at risk if no individuals or departments are named to ensure that your users and systems are in compliance with your PAM Policy? Let’s get the easy part out of the way: if your organization has its…


The #1 priority for improving cybersecurity? Implementing a Privileged Account Management Cycle approach!

January 5th, 2018

In a white paper released in October 2017 by analyst firm KuppingCole, Martin Kuppinger makes the case for why companies need to pay more attention to privileged account protection at all levels. Entitled, “Protecting the keys to your kingdom against cyber-attacks and insider threats,” he points out that Privileged Account Management is far more than…


MSPs at Risk: You are at serious risk if you are not properly managing your clients’ credentials

December 20th, 2017

I ask MSPs: How secure are the clients’ passwords you manage today? As an MSP you must meet special security needs because you hold critical privileged passwords, not only your own organization, but for your clients’ as well. Do you have an accurate answer for these questions, or are there some unknowns in your organization?…


PAM Risk Assessment: your first step to better privileged access control

December 12th, 2017

These days Privileged Access Management and Privileged Account Management (PAM) are interchangeable terms that get a lot of attention. There’s a reason why PAM is fast becoming a top-of-mind cybersecurity issue:  up to 80% of cybersecurity breaches are associated with the abuse or misuse of privileged account credentials. And these credentials readily give hackers or…


SSH Key Management: why you should never manage SSH keys manually

December 5th, 2017

Has your organization moved beyond simple user name and password schemes for accessing Unix and Linux systems by relying on SSH keys to allow access? If so, congratulations! You have greatly increased your overall security posture. However, if your organization is managing SSH keys manually, you have a long way to go before you can…


Taking the Anxiety out of Service Account Management

November 14th, 2017

“Service Account Management” is a deceptively simple term for a process that can be full of uncertainty and justifiable fears. Service Accounts can be the Active Directory accounts attached to your Windows Services, Scheduled Tasks, Application Pools, and more mission critical services that keep your organization operating and in business. The mere thought of having…


Protecting Critical Infrastructure from Cyber Threats

November 1st, 2017

Today we are truly living in the world of IoT—the Internet of things—with approximately 9 billion things, or devices, connected to the internet, many of which are powering and enabling our critical infrastructure. Every day billions of employees power up their devices and connect to the internet to plug into their everyday world, all of…


The Anatomy of a Privileged Account Hack: everything you need to know to protect your organization

October 6th, 2017

Not all hacks, or data breaches, are equal. While many breaches result in inconvenience and minor financial losses, others have the potential to devastate your organization’s finances, credibility, privacy, ability to meet compliance, and much more. A privileged account hack falls into the second category. Our white paper, The Anatomy of a Privileged Account Hack,…


Top 5 privileged account security reports CISOs must have: Who hasn’t logged in within the last 90 days?

August 16th, 2017

When you know exactly who has not used your privileged account management tool in a while you can eliminate potentially risky users who no longer need access to the tool and the privileged accounts that it protects. In this exclusive 5-part Thycotic educational series we outline the privileged account security reports CISOs must have to…


Top 5 privileged account security reports CISOs must have: Which privileged accounts are no longer valid?

August 1st, 2017

When you do not know which of your sensitive stored credentials are incorrect and no longer working normally, you run the risk that they will be changed outside the scope of your corporate policy by an administrator or by a malicious attacker who has breached your system. In this exclusive 5-part Thycotic educational series we…