+1-202-802-9399 U.S. Headquarters

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘Managing Privileged Accounts’

The Top 5 PAM Tasks IT Teams Must Automate Part 3: Team Password Sharing

June 22nd, 2017

Automating Team Password Sharing: Sharing access to admin accounts across an organization is a challenge. But with proper automation in place your users know exactly what systems they can access and which accounts they can use to access those systems—a proverbial “one-stop shop” to conduct their work fast and securely. In this 5-part Thycotic educational…


The Top 5 PAM Tasks IT Teams Must Automate Part 2: Changing Network Passwords

June 21st, 2017

Automating Network Password Changing: A password that remains the same year in and year out is a hacker’s dream, and a breach waiting to happen. Fortunately, there are tools that can force users to change passwords after a set period of time, and can automate password changing to protect privileged accounts. In this 5-part Thycotic…


The Top 5 PAM Tasks IT Teams Must Automate Part 1: Privileged Account Discovery

June 16th, 2017

Automating Privileged Account Discovery: The first rule of Information Security says, “You can’t protect what you don’t know you have.” In other words, you could be harboring a hacker as we speak. Let’s examine how automation can be used to discover, catalog and protect the privileged accounts on your network. In this 5-part Thycotic educational…


10 Tips to Ensure your Privileged Accounts for IoT are Protected and Secured

May 10th, 2017

Welcome to the world of IoT (Internet of Things) where more and more devices get connected online by the minute, with approximately 9 billion devices connected today.  Every day billions of employees power up their devices and connect to the internet to plug into their everyday world: check the news, receive and respond to emails, chat…


MSPs and IT Providers: The Three Things Every MSP Must Do

May 8th, 2017

Guest post by Ian Trump. Please find his full bio below in the author section. MSPs and IT providers have a problem, and it’s about to get a whole lot worse. By the time you land your third customer, you need to get a grip on three important things: Regular Daily Backup Invoicing and Time…


Top 4 Password Blunders And How Thycotic Can Help

January 24th, 2017

Satisnet Ltd Guest Post However bad a solution they are, we are all stuck using passwords and will be for the foreseeable future. Here are the typical bad password practices I see when I visit enterprises. 1. PASSWORD IN SPREADSHEETS, NOTEPAD FILES, NOTEBOOKS, PHOTOS ON PHONES ETC ETC So, what’s the problem: it’s password protected, right? WRONG! I…


Create a strong password security policy in 9 steps

January 10th, 2017

Here’s the bad news, your end users are lazy. You’ve seen it all… sticky notes on computer screens, computers left unlocked while people are out grabbing coffee, and simply not following your corporate security policies at all. Take a look at the latest data form SplashData announcing the 2015 edition of its annual “Worst Passwords…


The Password Spreadsheet: why you must NOT store enterprise passwords in Excel

December 6th, 2016

Is your organization still using an Excel password spreadsheet to store and manage sensitive passwords—the keys to your kingdom? You’re not alone. But storing privileged account passwords and credentials in a spreadsheet poses a serious security risk. There should be no such thing as a ‘password spreadsheet’ Excel was never intended to be a password…


Top 8 Cyber Security Best Practices You Cannot Ignore

October 4th, 2016

With more than 3.5 billion Internet users worldwide, cyber security is a hot topic and implementing best security practices is more important than ever! The sheer volume of accounts available for hacking is jaw dropping: 6 billion email accounts 2 billion Smartphones 1 billion Apple users 1 billion Gmail accounts 1.8 billion Facebook accounts …and…


Top 10 Questions to Ask Before Planning Your Privileged Account Management Strategy

August 25th, 2016

The shocking findings from the recent groundbreaking report from Thycotic and Cybersecurity Ventures highlights many companies are not doing enough to protect privileged accounts that are crucial to protecting companies from cyber-attacks. In this blog series we are going to look at some of the key findings so stay tuned. A major metric was that…