Real Estate Consulting
Security awareness training for all employees (incl. hacking demonstration) with a focus phishing and malware/ransomware.
For reasons of discretion, we do not list the names of our clients. However, we will be pleased to provide references and letters of recommendation following consultation with the organizations concerned.
Security awareness training for all employees (incl. hacking demonstration) with a focus phishing and malware/ransomware.
ISO 27002 security audit; analysis of the security level by means of a questionnaire tailored to customer needs, verification by means of an interview and document review; bespoke suggestions for improvements on information security incl. risk-based and prioritized measures.
ISO 27002 security audit; analysis of the security level by means of a questionnaire focused on access security, verification by means of an interview and document review; bespoke suggestions for improvements on information security
Technical security audit of the entire IT infrastructure: testing of the physical security of the main locations as well as in selected branch offices, penetration test of domains accessible from outside, conceptual and technical tests of security-relevant components (including firewall, VPN access, proxy server, mail server, network zoning), vulnerability scan of the internal IT infrastructure, establishment of a continuous data breach alert
ISO 27002 Security Audit; survey of the security level of 5 organizations by means of a questionnaire adapted to the customer’s wishes, verification by means of an interview and document review; tailor-made suggestions for improvement in information security including risk-based, prioritized measures and an overview of the entire organization
Penetration test of an application for the visualization of sensor data
Creation of an IT acceptable use policy for employees and a minimum standard for system authorization concepts
In a two 3-day workshop, a Swiss energy company were trained in IT forensics readiness. Starting with theoretical aspects at management level (threats with a high probability of occurrence), the creation of an incident response policy, the exact procedure for a forensic data backup and an applied exercise case, several topics were dealt by Oneconsult specialists with approx. 12 participants
Code Review and Penetration Test of various mobile applications and review of the associated architecture as part of a digital project
Web penetration test of a communication platform for practitioners and patients (incl. webservices).
Technical verification of a web application for the calculation, adaptation and selection of components for construction according to compatibility criteria
No results found.
Don’t miss anything! Subscribe to our free newsletter.
Availability Monday to Friday 8:00 a.m. – 6:00 p.m (exception: customers with SLA – please call the 24/7 IRR emergency number).
Private individuals please contact your trusted IT service provider or the local police station.
For more information about our DFIR services here: