Blog
Informative, up-to-date and exciting – the Oneconsult Cybersecurity Blog.

Social Engineering Blog: News & Trends

In our social engineering blog, you can find out everything you need to know about the manipulative techniques used by cyber criminals to gain access to confidential information. Social engineering is a widespread method that exploits human psychology to trick unsuspecting users into revealing sensitive data or downloading malicious software.

We offer you comprehensive insights into various forms of social engineering, including phishing, and show you how to protect yourself and your organisation. Our experts share best practices for recognising and avoiding potential threats.

tiber-dora-eu-regulation-oneconsult-cybersecurity

Enhancing Cyber Resilience Through Attack Simulations According to DORA and TIBER

The Digital Operational Resilience Act (DORA) and the TIBER-EU framework work hand in hand to strengthen the cybersecurity and resilience of financial institutions in the EU—DORA sets the regulatory foundation, while TIBER-EU enables realistic, threat-led testing. Together, they promote a proactive approach to identifying and mitigating cyber risks. We spoke with two of our TIBER-experienced experts to explore what makes these tests unique, the challenges they pose, and why elements like social engineering and physical security are key factors.

MORE
social engineering_schutz und praevention

Social Engineering – Risks and Prevention for Businesses

It is estimated that companies worldwide suffer billions worth of damages each year due to social engineering attacks. In response to the significant advancements made by companies in strengthening their technical defenses against cyberattacks in recent years, attackers are seeking new methods to gain unauthorized access to networks and obtain data. In essence, this is not a new phenomenon, but rather a shift back to the traditional methods used by attackers.

MORE
Social Engineering_Einfuehrung_Methoden

Social Engineering: Introduction and Techniques

The advent of the internet, along with the concurrent increase in computer processing power, ushered in the digital age for businesses. This technological progress, however, also gave rise to new threats in cyberspace, which presented significant challenges for companies. Consequently, there was a tendency to prioritize the hardening of the information infrastructure, with the “old” threats largely being relegated to the background.

MORE

Don’t miss anything! Subscribe to our free newsletter.

Your security is our top priority – our specialists provide you with professional support.

Availability Monday to Friday 8:00 a.m. – 6:00 p.m (exception: customers with SLA – please call the 24/7 IRR emergency number).

Private individuals please contact your trusted IT service provider or the local police station.

For more information about our DFIR services here:

QR_CSIRT_2022_EN@2x
Add CSIRT to contacts