Blog
Informativ, aktuell und spannend – der Oneconsult Cyber Security Blog.

Cyber Security Blog

Stöbern Sie durch spannende Artikel, aktuelle News und hilfreiche Tipps & Tricks unserer Expertinnen und Experten rund um die Cyber Security.

der-einfache-einstieg-in-das-thema-conditional-access-policies

An Introduction to Conditional Access Policies

Many businesses today rely on Microsoft 365 services. As these services become more popular, they also become more likely targets for hackers. Experience shows that there are still organizations that have not secured their Microsoft Cloud clients. Therefore, organizations should take protective measures against cyberattacks – Conditional Access policies are one such measure. This article provides an overview of how Conditional Access policies work.

MEHR
Phishing in Unternehmen

Response to Phishing Attacks in Companies

In the digital world, companies are constantly exposed to new threats. Phishing attacks are among the most insidious forms of such threats, as what looks like a simple click on an email can have devastating consequences – from financial loss to data breach.

MEHR
Schwachstellenanalyse mit MITRE ATT&CK

Vulnerability Analysis With MITRE ATT&CK

The non-profit organization MITRE has been documenting Tactics, Techniques and Procedures (TTPs) used by known Advanced Persistent Threats (ATPs) since 2013. The result is the MITRE ATT&CK® Framework. ATT&CK stands for “Adversarial Tactics, Techniques & Common Knowledge”.

MEHR
Incident Response Plan Red Flags

The 7 Red Flags When Creating an Incident Response Plan

A well-thought-out incident response plan (IRP) can prepare your organization for an emergency and enable you to respond to incidents in a more structured, efficient and comprehensive manner. An incident response plan provides a structured approach to handling cyber incidents and serves as a guide for each phase of the incident response process. This increases your incident response readiness.

MEHR
Unterscheidung zwischen Operational Technology (OT) und Information Technology (IT)

Distinction between Operational Technology and Information Technology

What would you expect power plants, production facilities and transportation companies to have in common? They all use Operational Technology (OT) in sometimes highly critical infrastructures to control industrial systems. Examples include production lines, robot systems and machines, to name just a few.

MEHR
Schnell und eifach den richtigen Passwortmanager finden

Quick and Easy Guide to Finding the Right Password Manager

In an increasingly digital world where the security of corporate data is a top priority, every organization faces the challenge of protecting sensitive information from cyber threats. We are all familiar with the dilemma of having to remember long and complex passwords.

MEHR

Nie mehr Aktuelles über Cyber-Security-Themen verpassen? Dann melden Sie sich für unseren Newsletter an.

Don’t miss anything! Subscribe to our free newsletter.

Your security is our top priority – our specialists provide you with professional support.

Availability Monday to Friday 8:00 a.m. – 6:00 p.m (exception: customers with SLA – please call the 24/7 IRR emergency number).

Private individuals please contact your trusted IT service provider or the local police station.

For more information about our DFIR services here:

QR_CSIRT_2022_EN@2x
Add CSIRT to contacts