A very happy announcement to start off October here at Intrinium – For the third consecutive year, Intrinium has been ranked in the top 3 of the Best Places To Work companies in the Inland Northwest. We are proud to announce we came in second among our competitors from around our region. This competition bases its findings on surveys from employees about their satisfaction at work, and we are honored to be among the top three participants for the third year in a row! Keeping an environment that our employees love is important to us here – as is maintaining the sterling standard of service and communication that our clients expect from us.
Intrinium is hard at work protecting, strengthening and supporting a multitude of industries throughout this uncertain year. We have added even more members to our team, encompassing a 24/7 roster that works coast-to-coast. So whether your company is facing challenges maintaining patient records, protecting your data from hackers, or just knowing how to install the latest updates, Intrinium is here to help.
Also of note – October is National Cyber-Security Month! Now in its 17th year, National Cybersecurity Awareness Month (NCSAM) continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have the resources they need to be safer and more secure online. Intrinium will be posting new content regarding these resources all month long, so be sure to keep an eye on our Facebook, Twitter and other social media for valuable resources.
While the world continues to change daily for many of us this year – that doesn’t mean malicious hackers have slowed down at all. To be sure to keep up to date and to learn more about all relevant cybersecurity news, feel free to take a peek at our recent blogs below.
Thank you again for your continued support of Intrinium, our employees and their families during this time. As always, our team is here to help, please reach out to us here with any questions, comments or concerns.

Phishing/Security Awareness Training with COVID
What To Look For Cyber actors, which are states, groups, or individuals who, with malicious intent, aim to take advantage of vulnerabilities and fear, may send emails with malicious attachments or links to fraudulent websites to trick victims into revealing sensitive...

Office 365 Migration
Many organizations are still struggling to transition their workforce to a remote-friendly deployment. We recommend looking at a solution that meets the following requirements: Secure access that maintains authentication and access controls Scalable and available so...

Support IT and Security Operations
As workforces are forced to operate in a de-centralized manner, organizations are challenged with not only the transition to enabling a remote workforce, but also providing operational IT and security support for their users. With all the chaos, it may seem easy to...

WFH Telecommunications Policies
COVID-19 accelerated an already rapidly unfolding discussion about the future of work. The availability of flexible work resources is greater than ever, but many teams lack adequate governance in place to effectively leverage them. The most common mistake is to...

Work From Home Security Checkup
It is a quiet morning as I tightrope around the numerous obstacles in my path, slowly heading towards my home office, precariously balancing molten coffee with the fresh scent of my morning bagel in the air, in what can only be described as Cirque du Soleil maneuvers....

How’s Your Business Continuity Plan Working Out?
One of the most important lessons that a CIO or CISO can learn is to never let a crisis go to waste. If you are like me, the “Pandemic” entry in your risk assessment and business continuity plan was considered, but perhaps overlooked a bit in favor of fires, floods,...

Remote Work Security for Defenders
With more and more companies having non-essential personnel working at home to reduce risk, we wanted to touch on some of the risks from a defender standpoint. One of the big things in my mind is that attackers are using the cover of increased remote work to try and...

Remote Pentesting in an Isolated World
All the discussions and media coverage surrounding COVID-19 are enough to make anyone wish to unplug from it all and while this is admittedly a fantastic way of cleansing the mental palette to focus on the more essential aspects of life, cyber criminals are working...

5 Ways Managed IT Provides Remote Support
Managing your business’ IT when you aren’t able to be on site can be complicated. Intrinium’s experts are available to remotely support your business, assist in navigating your IT challenges and ultimately save you time, money and increase your productivity. If you...

Why Social Engineering Awareness is Critical to Your Business
Social Engineering is the art of exploiting human psychology to gain access to data, systems, or buildings. Have you ever received an email saying your computer needs critical system updates? Or perhaps you received a call from the ‘government’ stating you owe money?...