In this article, we’ll explore how attackers are misusing trusted technologies - like OAuth and DKIM (more on these in a moment) - and why everyone should be cautious when a message or application requests access to user accounts.
How does it benefit the client?
- The company complies with the information security requirements imposed on it, e.g.: necessary competence to achieve compliance;
- compliance with legislation, such as NIS2, GDPR or DORA;
- conformity with standards necessary for operating in a particular field (e.g. E‑ITS, ISO 27001, NIST, etc.), or
- compliance with the client’s requirements or wishes (e.g. ISO 27001 certificate, SOC 2 report, etc.).


What do we do?
- Assessment of needs. We analyse your organisation to understand which standards or regulations apply to your activities.
- Gap analysis. We chart the existing situation, identify any gaps and make proposals to fix them.
- Roadmap preparation. We develop a clear roadmap for reaching the goals.
- Oversight and support. We offer continuous oversight and support to ensure consistent compliance to requirements and efficiency of controls.
- Crisis management and communication plans. We create and test crisis management and communication plans to ensure your organisation’s preparedness to unexpected events. This includes crisis simulations and employee training.
Sign up to get the latest updates by email
To keep abreast of what is happening in the economy, to receive timely information about changes in the law and the most important development trends in tax, legal and other important areas of business, subscribe to our newsletter.