We are committed to enhancing user experiences and optimize your productivity. Our Network Operations Center is here to monitor your core IT infrastructure remotely and alert your existing IT staff of potential issues before they cause user pain and downtime.
Our Network Operations Center was built with a security first mindset, to not only optimize your up-time. But, allow you to feel confident that we have your best interest in mind. If we identify a potential threat, we will proactively communicate for optimal productivity.
We will provide:
We will monitor critical IT infrastructure and usage on the following:
Switches and Firewalls
Expert engineers and consultants monitoring your network
Reduced Operational Costs and Overhead
Reduction in Downtime
Faster Identification of Incidents
In-House Pipeline for Incident Response Remediation
External Network Vulnerability Scans vs. Internal Network Vulnerability Scans: Why Both are Important
By Johnathan Dunlap – Information Security Associate – Intrinium When it comes to security, threats can come from anywhere. That is why we recommend utilizing both external and internal vulnerability scans to understand the breadth of vulnerabilities within and...
By Stephen Heath - Partner and Advisory CISO - Intrinium This story is all too familiar. Accidents happen but, what if that mistake could cost you the security of your company? An employee left their laptop in their car and came back to a broken window and stolen...
By Samantha Agather, Information Security Analyst- Intrinium A Hitchhiker’s Guide to Firewall Management Services As a business owner, you want to keep your data safe. But what if your firewall fails and customer information is stolen, or you lose the person...
By Stephen Heath - Partner and Advisory CISO - Intrinium A relatively sophisticated spear phishing attack has been reported by InfoSec journalist Brian Krebs of Krebs on Security that appears to target many US financial institutions, including Banks and Credit...
The Health Information Technology for Economic and Clinical Health (HITECH) Act changed the HIPAA requirements for notifications after a breach.
Chiara Morrison - Manager, Marketing Spokane Mayor's Cyber Cup 2019 Chiara Morrison sat down to interview the creator of Spokane Mayor’s Cyber Cup 2019, Max Dulin, Senior at Gonzaga University, Computer Science Major. Chiara: Max, can you tell me a little bit about...
Chiara Morrison - Manager, Marketing What is an Internal Vulnerability Test? The Intrinium Internal Vulnerability Assessment evaluates IT security from the inside of your organization and identifies critical vulnerabilities that could be exploited by attackers that...
Chiara Morrison - Manager, Marketing What is a Risk Assessment? Risk Assessment is the combined effort of executing the following: 1. Identifying and analyzing potential (future) events that may negatively impact individuals, assets, and/or the environment (i.e.,...
Chiara Morrison - Manager, Marketing All businesses, large and small, face the growing challenge of Information Security within the organization. As an SMB, we know you want to protect your clients’ data and meet compliance requirements without allocating a...
A side-channel attack is an attack vector through which a threat could glean information from your computer or information system. This could be as simple as reading emissions (see Emissions Security or EMSEC) from your computer to using sophisticated methods of monitoring data being written onto your hard disk and making determinations that way.