dcsimg

Top 5 Ways to Win your CEO/CTOs Heart

In today’s always-connected world it’s important to realize that, historically and traditionally, cybersecurity was the responsibility of the IT department. Any time a cyber incident or data breach occurred or security questions arose, these got deferred to IT for the answers. Failure to translate cyber risk into business risk has left many businesses clueless But with today’s massive data … [Read more...]

The Lockdown’s 10 Most Popular Blogs of 2017

2017 was a record year for cyber security with breaches and hacks making headlines just about every day.  Thank you for following along with the 2017 chaos as we captured the biggest breaches, security nightmares, and attacks. As a recap, here are the “Top 10” posts from the blog, sorted in increasing order based on readership. Let the countdown begin! #10: How Does Encryption Work?  Going … [Read more...]

5 Free Encryption Tools You Can Use Today to Protect Yourself!

Author Note:  These are all 3rd party tools that I have personally used, and/or have been recommended to me by peers and experts in the field.  With that said, Thycotic does NOT endorse any of these: please explore and use at your own risk.  Email Encryption Tool OpenPGP – An open source encryption protocol used by many clients for providing secure encrypted email transmissions.  Most email … [Read more...]

Stop storing cleartext credentials in the registry for Point of Sale systems

Do you want to enable auto logon on your PoS systems without compromise? Do you need to enable auto logon for a seamless buying experience for your customers, but you’re doing it in an unsecure way? Well, Thycotic’s Secret Server has the answer, with complete automation, and without storing credentials in cleartext. Let’s talk about how auto logon works, why it’s not recommended in most cases, and … [Read more...]