Threat Hunting
Threat Hunting is the next layer to your Information Security plan

Our team will manually scan for indicators that tell us if malware or an attacker has been or is currently on the network. This proactive scanning can uncover additional malicious threats that may go unnoticed by standard defenses and can help shrink the gap between breach and identification, therefore reducing the aftermath of a data breach.
Process

Preliminary Engagement

Begin Threat Hunt

Reporting & Exit Interview

Remediation Efforts
and Remove Threats
Outcome
Assist in detecting active incidents
Provide recommendations to strengthen security
Add additional logging measures to help protect detect future incidents
What’s the Risk?

Contact us today to schedule your
Threat Hunting engagement.
The Intrinium Review, September 2020
Autumn is finally upon us here in the Inland Northwest, and while the temperatures slowly drop outside, the work is staying hot here at Intrinium! In fact, we have recently added another 4 members to our team in order to stay ready for all of our customers needs! We...
Intrinium Named on 2020 Best Work Places Inland Northwest
Spokane Valley, WA - Intrinium has been highlighted as one of the top places where one can work as an employee. This conclusion was made after the best companies group and journal of business created a fourth annual list of top workplaces in the inland northwest....
The Intrinium Review, August 2020
As summer is winding down, we here at Intrinium are working hard at keeping our clients safe and moving - whether you're working from the office, the living room, the pool or a BBQ, we can cover you anywhere! And we are also proud to remind you that Intrinium is now...
Intrinium Announces Promotion of Pat Atwal to Chief Operating Officer
Spokane Valley, WA, July 19, 2020: Intrinium, a Spokane-based Information Technology and Managed Security solutions company that provides comprehensive consulting and professional services to businesses of all sizes, this week announced an important promotion within...
The Intrinium Review, July 2020
We are proud to share our July Newsletter with you! And we are also proud to remind you that Intrinium is now supporting dental and orthodontics offices, their security needs, and the special challenges of coming back to the office after COVID-19 with our Dental IT...
The Intrinium Review, June 2020
We are proud to share our June Newsletter with you! And we are also proud to remind you that Intrinium is now supporting dental and orthodontics offices, their security needs, and the special challenges of coming back to the office after COVID-19 with our Dental IT...
Advancing Technology and Optimizing Productivity for Dental Practices, Part 2
Part 2 As your partner, we pledge to have clear communication and transparent pricing. Why? Technology is complicated enough, you do not need to try to decipher a complex invoice. We build trusting relationships where candid conversations are critical to a successful...
Advancing Technology and Optimizing Productivity for Dental Practices, Part 1
Part 1 In today’s connected world, no business can operate without technology while remaining competitive. Technology can solve many problems for organizations, such as providing easier ways to communicate with your patients or by providing your staff the tools needed...
4 Tips to Secure your Endpoints and Protect your Business
As companies across our nation have moved to remote work, it has posed challenges for cybersecurity. The sudden acceleration of traditional network boundary demise has required many organizations to suddenly pivot initiatives to support secure teleworking or accept...
Extortionware: Ransomware’s Unholy Lovechild with Data Exfiltration
Approximately one year ago, Maze, the first large extortion ransomware attack came to the attention of the wider world, and since then, nine other ransomware families have joined the trend. From Sodinokibi, the descendant of GandCrab, to Maze attacks in the news, this...