Social Engineering

Tuning technology to prevent compromise to our network is important. However, training and educating your staff on best security practices is just as vital to your organization’s safety. At Intrinium, we believe in utilizing Social Engineering to assess the security awareness of employees. We provide a variety of social engineering offerings that can be customized to the needs of your organization. Social Engineering is not a one size fits all model, talk to us today about how we can help.

 

We offer the following tests:

Email-based Attack

Attempting to entice employees into opening a suspicious correspondence

Spear Phishing

Email and/or phone calls to gain network access

Remote Employee Awareness Exercises

Requesting sensitive information over the phone

On-Site Awareness Exercises

On-site activity where a trained resource tries to penetrate the physical location to gain access to sensitive information or on-premises locations.

Incident Response Solutions

By Samantha Agather, Information Security Analyst– Intrinium Have an incident? We can help. When things go wrong regarding your company’s data, it can be terrifying.  It will leave you wondering, what’s the full extent of the damage done, how did it happen and what’s...

A Hitchhiker’s Guide to Firewall Management Services

By Samantha Agather, Information Security Analyst- Intrinium A Hitchhiker’s Guide to Firewall Management Services As a business owner, you want to keep your data safe. But what if your firewall fails and customer information is stolen, or you lose the person...

Capture the Flag Comes to Spokane

Chiara Morrison - Manager, Marketing  Spokane Mayor's Cyber Cup 2019 Chiara Morrison sat down to interview the creator of Spokane Mayor’s Cyber Cup 2019, Max Dulin, Senior at Gonzaga University, Computer Science Major. Chiara: Max, can you tell me a little bit about...

What is an Internal Vulnerability Test?

Chiara Morrison - Manager, Marketing  What is an Internal Vulnerability Test? The Intrinium Internal Vulnerability Assessment evaluates IT security from the inside of your organization and identifies critical vulnerabilities that could be exploited by attackers that...

What is a Risk Assessment?

Chiara Morrison - Manager, Marketing  What is a Risk Assessment? Risk Assessment is the combined effort of executing the following: 1.     Identifying and analyzing potential (future) events that may negatively impact individuals, assets, and/or the environment (i.e.,...

External Penetration Test 101

Chiara Morrison - Manager, Marketing  All businesses, large and small, face the growing challenge of Information Security within the organization. As an SMB, we know you want to protect your clients’ data and meet compliance requirements without allocating a...

Pin It on Pinterest