2017 was a record year for cyber security with breaches and hacks making headlines just about every day. Thank you for following along with the 2017 chaos as we captured the biggest breaches, security nightmares, and attacks.
As a recap, here are the “Top 10” posts from the blog, sorted in increasing order based on readership. Let the countdown begin!
Going back to the basics – readers took a chance to gain a basic understanding of how encryption really works.
Ransomware upped the ante in 2017 and went into stealth mode. How did you take action to protect your enterprise?
Privileged Account Management is ever-changing. In 2017 we listened to our customers and will continue to stay at the forefront of your needs and security.
Guest author and security expert, Ian Trump, shares the 3 most important security to-dos for every MSP and IT Provider.
Our biggest UNLOCKED Conference EVER was hosted this year in the nation’s capital. Thank you to our customers and the InfoSec community for making it such a memorable event.
The latest Symantec report summarizes the state of cyber threats across the world. Our cyber security expert shares the biggest surprises from the report around IoT, open-source security tools used by hackers, and ransomware.
#4: Infographic: How to Promote Information Security in the Workplace. The University of Alabama at Birmingham hit home the importance of user awareness around cyber security with a well-designed infographic. Check it out!
Do all cyber security pros practice what they preach? Find out!
Most enterprises use Active Directory as the cornerstone to their IT infrastructure. After the Equifax data breach, we asked, “How quickly can a hacker gain access to Active Directory”?
It’s no surprise this blog post takes the #1 spot! Our cyber security expert shares his top takeaways from the 2017 Verizon Data Breach Investigations Report, one of the most popular reports in InfoSec.
There you have it, a roundup of the top 10 2017 blogs on The Lockdown. What is your top 2017 cyber security takeaway?
This is a Security Bloggers Network syndicated blog post authored by Jordan True. Read the original post at: Thycotic