+1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘PAM Basics’

Protect Your Privileged Credentials with WebAuthn

June 13th, 2019

85% of organizations fail to achieve basic PAM capabilities according to Thycotic’s 2019 State of Privileged Access Management (PAM) Maturity Report.  This is due in large part to poor security hygiene. It’s essential that organizations deploy proper security precautions to ensure privileged user accounts are not vulnerable or even already compromised. Organizations still struggle with…


World Password Day 2019: The 6 Worst Password Fails

April 30th, 2019

We’ve covered a lot of password security tips and ways to secure your credentials on The Lockdown. For World Password Day 2019 we thought we’d do things a bit differently and share some of the worst password fails this past year.  While these organizations and individuals may not appreciate the extra attention, these password fails…


How to Remove Admin Rights Without Reducing Productivity

April 9th, 2019

This is a guide to the risks associated with admin rights and over-privileged users, and how to remove admin rights in order to reduce those risks.  There are many options for removing administrator rights, however you must always consider business operation—removing admin rights should never jeopardize productivity.  Why do organizations use admin rights in the…


Measurable Results of Service Account Privilege Management

April 4th, 2019

It’s very easy for service accounts to fall off your radar. Virtually all organizations have some unknown service accounts and some have thousands. Why do service accounts get lost? An employee leaves and the account is simply abandoned. The account is used less and less until it becomes obsolete and forgotten. Default accounts are left…


The 7 Deadly Privileged Accounts You MUST Discover, Manage and Secure

March 26th, 2019

Privileged accounts and privileged access are at the heart of every business today. They ensure that the IT team can administer and manage the organization’s systems, infrastructure, and software, and they enable employees to access the data that enables them to make critical business decisions. Not only are most businesses dependent on privileged accounts, but…


New Hire Onboarding Checklist: A CISO’s Perspective

March 12th, 2019

When a new employee enters an organization there are various behind-the-scene activities that must take place to ensure the new hire an efficient onboarding experience. Many are administrative in nature and are taken care of by HR. But then there are those related to cyber security—and they are far too often overlooked. As a security…


Change Your Password Day: How to breakup with your password

January 29th, 2019

Do you have that one great password that you love? It’s your go-to when creating a new account. You love it because it’s reliable and usually tied to a fond memory like the street you grew up on, or your childhood pet. Problem is, your favorite password is putting you at risk For many, that…


The Privileged Access Management Lifecycle and Path to Maturity

August 7th, 2018

Privileged access management (PAM) can be defined as managing privileged accounts and delegating privileged actions. Within an organization, it governs who can access or use a privileged account and what they can do once logged in with that privileged account. Privileged access management includes both privileged account management and privileged session management. The PAM process…


How to create an Enterprise Password Policy that gets used

January 6th, 2017

What does the human brain have to do with Security? And most importantly, what does it have to do with password policies in the enterprise? Understanding how the human brain works (at a high level) can help your create the best Password Policy for your organization. Humans are fallible: we make mistakes and we forget…


10 Tips to begin 2017 as a Secure Enterprise

January 5th, 2017

Cyber Security is a very hot topic and with more than 3.5 billion Internet users worldwide, That includes, 6 billion email accounts, 2 billion smartphones, 1 billion apple users, 1 billion Gmail accounts, 1.7 billion Facebook accounts, and 300 million Twitter accounts who tweet 7,350 times per second, send 2.5 million emails per second, and…