Viking Tours

Our Solution

One of the most common types of security breaches comes from the physical data theft of company computers, laptops, portable devices, electronic media and even the old stack of paper files. Put your employees to the test and see if we can access confidential information.

What does a Viking Tour look like?

  • We challenge your access control and try to infiltrate your workplace disguised as an employee, customer, delivery worker, or other service personnel and through employing social engineering.
  • We create proof of access to sensitive documents from unlocked desk drawers or filing cabinets
  • Going through your company’s trash, looking for sensitive information that can be used in impersonating an employee or another type of social engineering  
  • We create proof of  passwords that have been written and displayed (or poorly hidden) on post-its near computers
  • We create proof of access to sensitive documents from unlocked desk drawers or filing cabinets and of passwords that have been written and displayed (or poorly hidden) on post-its near computers.
  • On any unlocked computers we open up our Training pages to raise awareness.

REQUEST A PERSONAL QUOTE

  • Please enter a number from 1 to 99999.