In this article, we’ll explore how attackers are misusing trusted technologies - like OAuth and DKIM (more on these in a moment) - and why everyone should be cautious when a message or application requests access to user accounts.
How does it benefit the client?
- It ensures the effectiveness of your organisation’s information security processes and controls.
- It helps to identify and remedy deficiencies in information security.
- It improves your organisation’s compliance with legislation and standards.
- It increases the confidence of the management and stakeholders in information security processes.


What is included in the service?
- Preparation of an audit plan. We determine an audit plan that covers assessment of the organisation’s information security processes and controls.
- Assessment of controls. We assess the existing information security controls and processes in order to identify the strengths and weaknesses.
- Risk analysis. We check the process of carrying out the risk analysis and make proposals for improvement. If necessary, we will carry out a risk analysis to identify and assess information security risks in accordance with the required or desired standard.
- NIS2 and DORA compliance audits. We carry out thorough audits to assess your compliance with the NIS2 and DORA regulations. We recommend improvements and help you implement the necessary measures.
- Report of audit results. We prepare a report that contains the findings of the audit, any deficiencies identified and recommendations for improvement.
- Follow-up audit. We carry out a follow-up audit to assess the effectiveness of corrective measures and ensure ongoing compliance with the requirements.
Sign up to get the latest updates by email
To keep abreast of what is happening in the economy, to receive timely information about changes in the law and the most important development trends in tax, legal and other important areas of business, subscribe to our newsletter.