+1-202-802-9399 (US)

2018 Black Hat
Hacker Survey Report:

Key takeaways straight from attendees at the 2018 Black Hat Conference

  • Windows 10 and 8 most conquered OS’s this past year
  • 91% of hackers exploit Windows environments despite use of GPO
  • 75% of hackers say companies are failing to implement Least Privilege

Knowing your user accounts will likely be compromised at some point, you need to implement a “zero-trust” security posture emphasizing least privilege to limit overprivileged accounts that give hackers wide and undetected access.  But you’ve got to do it without impacting user productivity.

See the full report for recommendations.

Hackers readily conquering Windows

Even though Microsoft has invested heavily to improve its cyber security, 50% of hackers say they easily compromised both Windows 10 and Windows 8 within the past year. Plus, more than 90% of hackers say they compromised Windows environments despite the use of Group Policy Objects (GPO). So, you want to think twice about relying solely on GPO for security.

Just as disturbing, three out of four (75%) hackers say companies fail at applying the principle of least privilege, giving their user’s accounts too much access—and hackers too many opportunities to escalate privileges undetected!

You’ve got to limit the overprivileged

Knowing your user accounts will likely be compromised at some point, you need to implement a “zero-trust” security posture emphasizing least privilege to limit overprivileged accounts that give hackers wide and undetected access.  But you’ve got to do it without impacting user productivity.

Get the full Report now

free whitepaper:

Top 10 Keys to Successful Least Privilege
Adoption via Application Control

free whitepaper:

Move Beyond GPO for
Next-Level Privilege Management

free tool:

Least Privilege Discovery Tool

free tool:

Endpoint Application Discovery Tool

Watch the Webinar
The Insider’s Guide to Successfully Implementing Least Privilege

Watch this webinar to get an insider’s guide to successfully implementing least privilege.

Logo - KuppingerCole Analysts

“Thycotic Privilege Manager is a mandatory addition to traditional privilege management solutions, which lack the support for the specific requirements of endpoint privilege management.”

Read the full KuppingerCole Executive View on Thycotic Privilege Manager

Implement least privilege through application control

thycotic
privilege manager

Stop malware and ransomware from exploiting
applications by removing local administrative
rights from endpoints.

Try Privilege Manager 
Free 30-day Trial

By completing this form you are opting into emails from Thycotic. You can unsubscribe at any time.