Blog
Informative, up-to-date and exciting – the Oneconsult Cybersecurity Blog.

Cybersecurity Blog

Browse through exciting articles, current news and helpful tips & tricks from our experts on all aspects of cybersecurity.

Ransomware Detection and Prevention

Ransomware: Detection and Prevention

Ransomware represents one of the most significant and pervasive cyberthreats today. What originated as a relatively rudimentary blackmail tool has evolved into a highly sophisticated and organized criminal industry. Businesses and private individuals worldwide are confronted with this growing threat due to its relentless and indiscriminate nature.

MORE
Incident Response Readiness Assesment für Unternehmen

Be Prepared for Emergencies: Incident Response Readiness Assessment for Your Organization

The importance of having a high level of cyber resilience is increasing exponentially these days as cyberattacks become more complex and frequent. Cyber resilience is the ability of a company to maintain business operations in the event of a cyberattack and to return to normal state as quickly as possible. This requires both preventive measures to avoid cyberattacks and strategies for rapid response and recovery in the event of a successful attack.

MORE
Tabletop Exercises

Tabletop Exercises: Putting Your Crisis Management to the Test

The prevalence of cyberattacks has increased markedly in recent years, becoming a common occurrence in the contemporary business environment. The vast majority of us utilize information technology tools, are connected to networks, and benefit greatly from this connectivity. Nevertheless, an increasing number of companies are coming to recognize that malicious actors are also exploiting this networking and the resulting dependence on digital resources to their advantage. Ransomware attacks for example have become part of the everyday problems faced by many organizations.

MORE
Nutzen von Red Teaming

Red Teaming: What Are the Benefits and Who Is It Useful For?

In an increasingly complex and dynamic world, it is essential for organizations to continually review and improve their security and defense strategies. One of the most effective ways to uncover vulnerabilities and build resilience is through red teaming. But what exactly is red teaming? And for what types of organizations is it best suited?

MORE
der-einfache-einstieg-in-das-thema-conditional-access-policies

An Introduction to Conditional Access Policies

Many businesses today rely on Microsoft 365 services. As these services become more popular, they also become more likely targets for hackers. Experience shows that there are still organizations that have not secured their Microsoft Cloud clients. Therefore, organizations should take protective measures against cyberattacks – Conditional Access policies are one such measure. This article provides an overview of how Conditional Access policies work.

MORE
Phishing in Unternehmen

Response to Phishing Attacks in Companies

In the digital world, companies are constantly exposed to new threats. Phishing attacks are among the most insidious forms of such threats, as what looks like a simple click on an email can have devastating consequences – from financial loss to data breach.

MORE
Schwachstellenanalyse mit MITRE ATT&CK

Vulnerability Analysis With MITRE ATT&CK

The non-profit organization MITRE has been documenting Tactics, Techniques and Procedures (TTPs) used by known Advanced Persistent Threats (ATPs) since 2013. The result is the MITRE ATT&CK® Framework. ATT&CK stands for “Adversarial Tactics, Techniques & Common Knowledge”.

MORE
Incident Response Plan Red Flags

The 7 Red Flags When Creating an Incident Response Plan

A well-thought-out incident response plan (IRP) can prepare your organization for an emergency and enable you to respond to incidents in a more structured, efficient and comprehensive manner. An incident response plan provides a structured approach to handling cyber incidents and serves as a guide for each phase of the incident response process. This increases your incident response readiness.

MORE
Unterscheidung zwischen Operational Technology (OT) und Information Technology (IT)

Distinction between Operational Technology and Information Technology

What would you expect power plants, production facilities and transportation companies to have in common? They all use Operational Technology (OT) in sometimes highly critical infrastructures to control industrial systems. Examples include production lines, robot systems and machines, to name just a few.

MORE
Schnell und eifach den richtigen Passwortmanager finden

Quick and Easy Guide to Finding the Right Password Manager

In an increasingly digital world where the security of corporate data is a top priority, every organization faces the challenge of protecting sensitive information from cyber threats. We are all familiar with the dilemma of having to remember long and complex passwords.

MORE
Spear Phishing

What Is a Spear Phishing Attack?

In the digital world, we are exposed to various threats every day. One of the most sophisticated and effective attacks is spear phishing. Unlike regular phishing attacks, where cybercriminals send mass emails hoping to deceive a few users, spear phishing targets specific individuals or organizations.

MORE
Erhöhen Sie Ihre Cyber-Resilienz durch Purple Teaming

Increase Your Cyber Resilience Through Purple Teaming

Purple teaming results from the merging of the red (team) and the blue (team) and illustrates how the two teams work together to improve the cyber security of an organization. This is achieved through a cooperation between the two teams, where attack scenarios are discussed, carried out, and analyzed jointly by both teams.

MORE
Die Sicherheit des eigenen Active Directory (AD) verbessern

Improve the Security of Your Own Active Directory (AD)

The vast majority of companies nowadays use Windows and therefore Active Directory. The default settings are often designed for functionality rather than security. Also, when an environment has grown over the years, misconfigurations can easily creep in. In addition, weak passwords also compromise its security. All this can make it easy for attackers once initial access to the Active Directory is gained.

MORE

The 360 Degree Checklist to Manage Cyber Incidents

Preparation with a comprehensive checklist is central to managing a cyber incident. To ensure that nothing is forgotten during the stressful situation, all departments of a company must be informed about their tasks and duties in advance.

MORE
SCION-–-Allheilmittel-gegen-DDoS-Angriffe

SCION – A Panacea Against DDoS Attacks?

So-called DDoS attacks (Distributed Denial of Service) on IT infrastructures are on the rise – even authorities and critical infrastructures are affected. Can the SCION technology developed in Switzerland prevent the shutdown of Internet services in the future?

MORE

Don’t miss anything! Subscribe to our free newsletter.

Your security is our top priority – our specialists provide you with professional support.

Availability Monday to Friday 8:00 a.m. – 6:00 p.m (exception: customers with SLA – please call the 24/7 IRR emergency number).

Private individuals please contact your trusted IT service provider or the local police station.

For more information about our DFIR services here:

QR_CSIRT_2022_EN@2x
Add CSIRT to contacts