Social Engineering

Tuning technology to prevent compromise to our network is important. However, training and educating your staff on best security practices is just as vital to your organization’s safety. At Intrinium, we believe in utilizing Social Engineering to assess the security awareness of employees. We provide a variety of social engineering offerings that can be customized to the needs of your organization. Social Engineering is not a one size fits all model, talk to us today about how we can help.

 

We offer the following tests:

Email-based Attack

Attempting to entice employees into opening a suspicious correspondence

Spear Phishing

Email and/or phone calls to gain network access

Remote Employee Awareness Exercises

Requesting sensitive information over the phone

On-Site Awareness Exercises

On-site activity where a trained resource tries to penetrate the physical location to gain access to sensitive information or on-premises locations.

We are here to help, contact us today.

Events to Look for in a Firewall

By Augusto Melo – Information Security Analyst– Intrinium Regardless of your company size,  Information Security is indispensable, and firewalls are one of the first lines of defense against cyber threats. Fortunately, there are many firewall offerings available in...

NIST and Monitoring

By Sahan Fernando –Director, Managed Security– Intrinium   In a recent blog, Tracy Martin prepared an overview and introduction to the NIST Cybersecurity Framework. This framework is utilized by countless organizations to define their policy and procedures, and for...

Introduction to Vulnerability Management

By James Lee –Information Security Analyst: Team Lead– Intrinium   Introduction to Vulnerability Management  The number of attackers looking for weaknesses in your network environment is growing. These attackers are looking for vulnerabilities, such as outdated...

NIST Overview

By Tracy Martin – Senior Information Security Consultant – Intrinium   NIST Overview The NIST Cybersecurity Framework (NIST CSF), provides organizations with a structure that can be used to assess and improve their organization’s ability to prevent, detect and respond...

Managing the Information Security Budget

By Tracy Martin – Senior Information Security Consultant – Intrinium  Developing a budget for your information security program can be challenging.  Priorities have a way of changing throughout the year, regulations change, or new regulations, such as the GDPR, are...

Phishing and The Seasons

By Sahan Fernando - Director, Managed Security - Intrinium  Phishing is constant, relentless and a perpetually annoying threat for all Information Security professionals. As we move into year-end, it is important to remind your staff that phishing is all about being...

Financial Planning for Security

By Sahan Fernando - Director, Managed Security - Intrinium  Budget success depends on having a strategic IT plan and vision, executed by a strong leader and supported by good processes. With the fiscal year 2019 right around the corner, this is something we all need! ...

Celebrating Cybersecurity Month!

By Chiara Morrison - Manager, Marketing - Intrinium  October 2018 marks the 15th annual National Cybersecurity Awareness Month (NCSAM), which is an annual initiative to raise awareness about the importance of cybersecurity. NCSAM 2018 is a collaborative effort between...

Pin It on Pinterest