dcsimg

Back to the Basics: Service Account Management 101

Service accounts don’t have to be a nightmare. Get in control now.  Service accounts are typically used in operating systems to execute applications or run programs, either in the context of system accounts (high privileged accounts without any password) or a specific user account, usually created manually or during software installation.  On Unix and Linux they are often known as init or inetd, … [Read more...]

Enterprise Password Management for Everyone from SMBs to Corporations: Everything You Need to Know

A simple yet effective business password management system takes high priority on the wish-list of every organization, big or small. This is evidenced by the sheer volume of people searching Google for “the best password protection” every day. But what may surprise you is that whether you’re attempting to manage passwords for a huge corporation, a medium sized business or a small team—you must go … [Read more...]

Six Key Differences Between Password Management Tools and PAM

In the past, Privilege Access Management (PAM) was accessible only to large enterprises with skilled IT teams. Feature-heavy PAM tools became more and more complex and expensive to manage. Meanwhile, security-conscious small and medium businesses were relegated to using password tools designed primarily for consumers. While consumer password tools provide a “password vault” to store user … [Read more...]

Back to the Basics: The problem with forcing regular password expiry

For many people and organizations around the world a single password is sometimes the only security control protecting their sensitive information, access to email and even their bank account. The traditional password best practice was to create a long, complex password that only you would know, and it protected one or two accounts; you likely used it to sign into Active Directory or email … [Read more...]

Get Back to the Basics this World Password Day 2018

If you believe passwords will be killed off by biometrics, read this stat from a recent Cybersecurity Ventures report: “The world will need to secure over 300 billion passwords by 2020.” What happened to biometrics? Many visionaries declared that the release of Apple’s Face ID would call for the end of passwords as we know them. The reality is, it’s not that simple. Just months later … [Read more...]

Privileged Behavior Analytics Deep-Dive: Responsive Actions

Privileged Behavior Analytics Recap Thycotic’s Privileged Behavior Analytics (PBA) software monitors user activity within Secret Server to detect anomalous behavior.  Once the user’s baseline activity is determined, deviations from that behavior can trigger alerts or warnings to notify security admins.  The software’s machine learning considers the time of day, IP address, user … [Read more...]

Cyber Security Responsibilities: Who owns your organization’s PAM Policy Template?

Who is responsible for creating, implementing and overseeing your organization’s Privileged Account Management Policy template? And what is at risk if no individuals or departments are named to ensure that your users and systems are in compliance with your PAM Policy? Let’s get the easy part out of the way: if your organization has its PAM Policy clearly defined in a template, yet users are left … [Read more...]

Privileged Password 101: What exactly is it?

As the total universe of passwords will likely grow to more than 300 billion by 2020, people and organizations across the world face a massively growing cyber security risk from hacked or compromised user and privileged accounts—sometimes a single password being the only security control preventing cyber criminals from gaining access to the victim’s sensitive information. Apple’s face ID has … [Read more...]

Taking the Anxiety out of Service Account Management

“Service Account Management” is a deceptively simple term for a process that can be full of uncertainty and justifiable fears. Service Accounts can be the Active Directory accounts attached to your Windows Services, Scheduled Tasks, Application Pools, and more mission critical services that keep your organization operating and in business. The mere thought of having to rotate the password on any … [Read more...]