Vigilance™ Incident Response & Forensic Analysis

Within a data breach scenario, an effective incident response plan is critical in limiting the scope and impact of the incident. Having qualified incident responders available to lead an investigation greatly improves the ability of an organization to quickly assess, contain, and eliminate a data incident.

We offer a variety of Incident Response Solutions based on the needs of your organization

Immediate

Your organization has experienced a breach and needs immediate remediation and activation to maintain business continuity and compliance. Hourly based model, dependent on complexity, and timeline to resolve.

Emergency Incident Response Includes:

 

Incident Response Playbook by Certified Professionals
Remote and On-Site Support
Remote and On-Site Support
Triage Analysis

Retainer

Your organization is looking to be prepared for if/and when incident remediation may need to happen. Hourly based retainer model.

Retainer Incident Response Includes:

 

24x7x365 Security Incident Hotline
Remote Support within 12 hours
On-Site Support within 36 hours
Flexible Use of Hours
Pre-Negotiated Rates and Standard Contract
Triage Analysis

We are here to help, contact us today.

California Consumer Policy Act of 2018

Chiara Morrison - Manager, Marketing  2018 has been the year of regulation in the Information Security community from General Data Protection Regulation (GDPR) to the California Consumer Policy Act (CCPA), privacy and security is more important than ever.  2019 is...

Top 18 of 2018

Chiara Morrison - Manager, Marketing  As we wrap up the year, we wanted to share some of our favorite and most trafficked blog posts from our staff writers. We hope you enjoy! https://intrinium.com/smb-relay-attack-tutorial/ https://intrinium.com/events-2/...

Tips for Staying Safe This Holiday Season

By Chiara Morrison - Manager, Marketing  As we head into the holiday season, The National Cybersecurity & Communications Integration Center (NCCIC), reminds users to be aware of seasonal scams and malware attacks. As of the NCCIC release on November 19th, 2018,...

Managing the Information Security Budget

By Tracy Martin – Senior Information Security Consultant – Intrinium  Developing a budget for your information security program can be challenging.  Priorities have a way of changing throughout the year, regulations change, or new regulations, such as the GDPR, are...

Phishing and The Seasons

By Sahan Fernando - Director, Managed Security - Intrinium  Phishing is constant, relentless and a perpetually annoying threat for all Information Security professionals. As we move into year-end, it is important to remind your staff that phishing is all about being...

Financial Planning for Security

By Sahan Fernando - Director, Managed Security - Intrinium  Budget success depends on having a strategic IT plan and vision, executed by a strong leader and supported by good processes. With the fiscal year 2019 right around the corner, this is something we all need! ...

Celebrating Cybersecurity Month!

By Chiara Morrison - Manager, Marketing - Intrinium  October 2018 marks the 15th annual National Cybersecurity Awareness Month (NCSAM), which is an annual initiative to raise awareness about the importance of cybersecurity. NCSAM 2018 is a collaborative effort between...

This is why O365 is the right move for your business

By Ben Ross – Director, Managed IT – Intrinium   It seems like everyone these days wants a piece of the cloud – it’s the buzzword that is supposed to solve your business problems in a snap. But is it really worth the hype? It can be an efficient way to utilize your...

SMB Relay Attack Tutorial

Don’t even bother cracking NTLMv2 hashes gathered with Responder! Instead, just relay them to a target machine on the network and pop yourself into a LocalSystem shell. This attack uses the Responder toolkit to capture SMB authentication sessions on an internal network, and relays them to a target machine.

Pin It on Pinterest