
Our Solution
One of the most common types of security breaches comes from the physical data theft of company computers, laptops, portable devices, electronic media and even the old stack of paper files. Put your employees to the test and see if we can access confidential information.
What does a Viking Tour look like?
- We challenge your access control and try to infiltrate your workplace disguised as an employee, customer, delivery worker, or other service personnel and through employing social engineering.
- We create proof of access to
- We create proof of access to sensitive documents from unlocked desk drawers or filing cabinets and of passwords that have been written and displayed (or poorly hidden) on post-its near computers.
- On any unlocked computers we open up our Training pages to raise awareness.
- …
REQUEST A PERSONAL QUOTE