Blog
Category: IT security
From reconnaissance to reporting – about the security testing process
Penetration testing (or pentesting) is an authorized process of finding weaknesses, vulnerabilities and security risks, in order to prevent them from being exploited by potential adversaries. We will go through the basic methodology and more technical (and non-technical) details of the penetration testing process.
Phishing campaign – simulated attack on an organization as an effective way to fight cybercrime
Hacking attacks are on the rise. In the era of the pandemic, there has been a large increase in phishing campaigns thematically related to COVID-19.
What has GDPR got to do with software?
Do you develop software? Does your organization order the development of, or plans to purchase, a business application? Whichever side you represent, in the context of software you must have heard the following words repeated like a mantra: GDPR, privacy by design and privacy by…
WordPress security in a modern business
There is an unwritten rule in the IT security industry which says that “the more widespread a solution is, the more likely it is to be targeted” (that is, the more exposed it is to security threats). This applies to any software, be it commercial or…
From reconnaissance to reporting – about the security testing process
Penetration testing (or pentesting) is an authorized process of finding weaknesses, vulnerabilities and security risks, in order to prevent them from being exploited by potential adversaries. We will go through the basic methodology and more technical (and non-technical) details of the penetration testing process.
Phishing campaign – simulated attack on an organization as an effective way to fight cybercrime
Hacking attacks are on the rise. In the era of the pandemic, there has been a large increase in phishing campaigns thematically related to COVID-19.
What has GDPR got to do with software?
Do you develop software? Does your organization order the development of, or plans to purchase, a business application? Whichever side you represent, in the context of software you must have heard the following words repeated like a mantra: GDPR, privacy by design and privacy by…
WordPress security in a modern business
There is an unwritten rule in the IT security industry which says that “the more widespread a solution is, the more likely it is to be targeted” (that is, the more exposed it is to security threats). This applies to any software, be it commercial or…
About us
Onwelo is a Polish cutting-edge technology company specialising in developing innovative IT solutions. Our main areas of operations are: business analysis, software development and maintenance, software testing, IT infrastructure management, development of Data & Analytics and Intelligent Automation solutions, and delivering cloud-based products and services.
About us
Onwelo is a Polish cutting-edge technology company specialising in developing innovative IT solutions. Our main areas of operations are: business analysis, software development and maintenance, software testing, IT infrastructure management, development of Data & Analytics and Intelligent Automation solutions, and delivering cloud-based products and services.