+1-202-802-9399 U.S. Headquarters

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘Small Business’

The Tide is Turning for Privileged Account Management and Security

July 14th, 2017

CyberArk’s latest preliminary earning report and investor reactions show they’re starting to lose sight on what the market is looking for. For years CyberArk has been the biggest and, in many cases, the only player in the Privileged Account Management space.  When you’re one of the first to market, it gives you a lot of…


Demystifying the EU General Data Protection Regulation – Let’s BUST the Myths

July 10th, 2017

Yes, you’ve all heard about it. Many companies have been raising the alarm about GDPR for months now, all offering protection and silver bullets to solve anything and everything to do with GDPR—all you have to do is install this one box. Right! It’s caused a lot of confusion and many questions, and organizations have…


An Introduction to Business Networks 101

June 2nd, 2017

The intent of this post is an introduction for people who are either exploring getting into some sort of network administration, either for your personal education (such as a college degree) or maybe you’re looking to make a career change.  When it comes to understanding more complex aspects, such as cyber security, sometimes it’s best…


Ransomware in Real Life

March 28th, 2017

Ransomware – you hear about in the office, even on the evening news since attackers have become creative in this newer threat invention. Everyone’s talking about it, so, what is it? Ransomware is a type of malicious software designed to block access to a computer system until a sum of money is paid – usually…


Phishing Scams: Your Social Media and Email Security Checklist

March 2nd, 2017

Phishing scams are on the rise, and they surge during tax season. Phishing is the practice of sending a potential victim an email or message that looks like legitimate correspondence from the IRS,  a bank, or an organization, but clicking on links within the message takes the victim to a fake website. Once on the website (which often also…