Magazine Button
Thycotic releases free book: Least Privilege Cybersecurity For Dummies

Thycotic releases free book: Least Privilege Cybersecurity For Dummies

Enterprise SecurityMore NewsNetwork
Thycotic has released a free book: Least Privilege Cybersecurity For Dummies

Thycotic, a provider of privileged access management (PAM) solutions for more than 10,000 organisations worldwide, has announced the release of its new book Least Privilege Cybersecurity For Dummies – available free electronically as well as in print.

The new book provides IT professionals, as well as business users, with a primer on how to limit user and application access to privileged accounts especially on endpoints through various controls and tools without impacting productivity.

“More than 80% of breaches involve compromised IT and business user credentials such as IDs and passwords,” said Joseph Carson, author and Chief Security Scientist at Thycotic. “Because of this, organisations today are limiting privileged access to services, applications, data and systems as a top priority.”

In many cases, users may not even realise the type of access they possess. They only know that when access is denied and they can’t get their work done. Hackers and cybercriminals target these privileged accounts because once compromised, they give the ability to move across IT systems and networks undetected.

Written in the straightforward style that the Dummies book franchise is known for, the book helps guide IT professionals on the right path to eliminating overprivileged access by users, applications and services.

It’s an ideal starting point for gaining:

  • An understanding of the basic concepts of least privilege cybersecurity
  • Knowing the key steps to planning a least privilege cybersecurity strategy
  • Seeing how to apply least privilege with application control to reduce risk without impacting productivity

“Companies are spending billions of dollars on cybersecurity but hackers, cybercriminals and disgruntled employees continue breaching computer systems, stealing sensitive information or disrupting services,” said James Legg, CEO at Thycotic.

“By limiting privileged access with application control, organisations can take a major step towards preventing these breaches from happening in the first place.”

To download a copy of the Least Privilege Cybersecurity for Dummies book or to receive a hard copy, visit

Click below to share this article

Browse our latest issue

Intelligent CISO

View Magazine Archive