Threats Archives -TEISS® : Cracking Cyber Security

Category: Threats

Three steps to protecting crypto holdings against SIM Jacking

Author: webeditor

Kevin Owocki, Founder at Gitcoin, shares three ways cryptocurrency holders can protect themselves against the growing threat of SIM jacking. You wake up to an email from Coinbase notifying you that your withdrawal has been confirmed. “That’s strange,” you think.... Read more

intangible assets can be damaged by cyber breaches

Protecting soft intangibles

Author: Jeremy Swinfen Green

Teiss Head of Consulting Jeremy Swinfen Green looks at how some intangible assets that seem safe from hackers can still be badly damaged in a cyber-attack. At a presentation on the Hermeneut project * at the Digital Catapult in central London this... Read more

Protecting your organisation from insider threats

Author: webeditor

Steve Armstrong, Regional Director UK, Ireland, and South Africa at Bitglass , considers the unique security challenges posed by insider threats, how the transition to the cloud has made it even harder to protect against them, and what tools are available... Read more

A guide to phishing emails and how they work

Author: Keil Hubert

The most efficient phishing attacks are precisely crafted messages that use our known psychological attributes against us, stimulating us to act against our own training and better judgment. Security Awareness writer Keil Hubert describes a mysterious email message that could... Read more

Get the latest cyber news in your inbox

Join our community of cyber professionals today!