+1-202-802-9399 U.S. Headquarters

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘Passwords and Authentication’

What is Biometric Authentication?

August 8th, 2017

Bio authentication, or biometric authentication, is a method of authentication (proving you are who you say you are) based on something biological to the human being.  Biometric authentication is another form of multi-factor authentication (providing several separate pieces of evidence proving who you are), and can be used in conjunction with another form of authentication,…


The Pros and Cons of Frequent Password Rotation

May 31st, 2017

What this title really should say is “the cons and cons of frequent manual password rotation”.  To be honest, I can’t think of a single good reason why anyone should be subjected to frequent manual password rotations.  There is nothing about that concept that screams “Good Idea”. Now… before you run off… let me explain.…


5 Shocking Insights into the Social Network Habits of Security Professionals [And Infographic]

May 30th, 2017

It may come to a shock for some of you, but not all security professionals practice what they preach. In a recent survey, the “real” truth came to light around cyber security professionals and their security habits around social media usage. Hacking social media accounts has never been easier. Attackers take advantage of poor password…


Part 1: How did my password get hacked? It’s simple…

May 11th, 2017

I wish that we could tell you that the reason your password and account were hacked was due to some really high tech and sophisticated character in a dark room lit only by a giant panel of computer monitors.  Just like you see on your favorite TV show.  Unfortunately, this isn’t the case. It’s not…


The Password Love Affair: Would you share your password with your partner?

February 14th, 2017

Passwords, for many people and companies, are one of the vital security controls that protect us from external hackers and cyber threats. Passwords are part of everyday life and protect our privacy and sensitive information from unauthorized access. Every day billions of people power up their devices and connect to the internet to access online…


10 Tips to begin 2017 as a Secure Enterprise

January 5th, 2017

Cyber Security is a very hot topic and with more than 3.5 billion Internet users worldwide, That includes, 6 billion email accounts, 2 billion smartphones, 1 billion apple users, 1 billion Gmail accounts, 1.7 billion Facebook accounts, and 300 million Twitter accounts who tweet 7,350 times per second, send 2.5 million emails per second, and…


Privileged Passwords and PCI-Compliance

June 2nd, 2016

Guest post from Alpha Generation a Thycotic certified partner who specializes in IT distribution with a focus on proactive security in the UK. Anyone that handles payment card data is affected, so most of us have heard of the Payment Card Industry Data Security Standard (PCI-DSS). It establishes key expectations for protecting cardholder data, whether you’re handling…


Privileged Passwords. The easiest way into your business?

March 29th, 2016

  We’ve had great success in EMEA teaming with the top partners to deliver the industry’s most comprehensive privileged account management solution. Here’s an example of what our distributor in the UK, Alpha Generation, recently posted about how easily it is for attackers to gain privileged access and take over the network.   Attackers don’t break-in when they…


PAM Security Video Series Part 1: Are Passwords Dead?

June 23rd, 2015

In this video blog series, IT security experts explain why compromised privileged credentials are at the heart of most large-scale cyber-attacks, and how privileged account management can help IT teams mitigate a host of security and compliance issues. The series starts by debunking the common information security myth – passwords are dead! Information security professionals and…


How to Use Passwords for Better Cyber Security

May 12th, 2015

Passwords have been the pillar of computer security longer than anyone can remember. In today’s world, however, enterprise passwords can add little to no security unless both end-users and IT administrators take their implementation seriously. In this article, we will discuss how to create a password that is effective at delaying and deterring the efforts…