Quick Intelligence Blog

Maria Catricala and Dave Millier

Recent Posts by Maria Catricala and Dave Millier:

What is Malware?

Malware is loosely defined as software that, when installed on your pc, laptop, mobile device or server, does things that you really don’t want it to do. It could delete files, change your browser path, or create what’s known as a C&C (Command & Control) connection to an external server, allowing a hacker to connect directly into your PC without you knowing. It can run silently and hidden in the background, stealing your banking credentials when you log into the bank.

Topics: Ransomware cyber security Malware

What is Anti-virus Software?

Computer viruses are bits of computer code that are designed to perform a specific purpose and are usually designed to propagate from one computer to another on a network. Just like viruses in the human body, a virus on a computer or network can make that computer “sick” meaning it doesn’t function the way it’s supposed to.

Topics: Ransomware cyber security Malware Anti-Virus

What is the Dark Web?

Nowadays, the digital equivalent of the wild west is called the Dark Web. The dark web is a subset of the internet that is intentionally hidden and not indexed. To access the Dark Web, a specific browser, like Tor, is required. Unavailable to the casual internet user, the Dark Web houses a treasure trove of stolen information, offering it for sale and trade on chat groups and online forums.

Topics: cyber security Breach

What is a Firewall?

A firewall is software or hardware that sits at the edge of your network, between your company and the Internet. It’s designed to keep hackers out and to allow legitimate connections into your network if needed. Legitimate connections may include access to email, access to a company website or corporate cloud apps.

Topics: cyber security

Why do my Customers Want to Know About my Cyber Security Practices?

They say a fence is only as strong as its weakest link, that holds true with cyber security as well. With most companies outsourcing services to companies like yours (and ours!), what we do to protect ourselves directly impacts the overall cyber security postures of our customers.

Topics: cyber security Compliance Privacy

How do Privacy Requirements Affect my Business?

Privacy and security go hand in hand. Cyber security focuses on protecting the information from unauthorized access, while privacy focuses more on protecting the contents of the information and ensuring it isn’t accessed or shared inappropriately. Both businesses and individuals have an expectation of privacy when they trust another business with their data.

Topics: cyber security Compliance Privacy Breach

What is PCI Compliance?

PCI compliancePCI compliance, or Payment Card Industry compliance, is a set of standards created to ensure that when business take credit card payments online, they do it in a secure manner, minimizing the risk of credit card theft. The PCI Council creates the rules (there are ~150 of them) which dictate everything from firewall configuration to security protection on devices used to store, process, or transmit credit card data.

Topics: cyber security Compliance

What is PIPEDA?

Canada’s data privacy law, the Personal Information Protection and Electronic Documents Act, or PIPEDA, governs how private Canadian companies are responsible for the collection, use and disclosure of personally identifiable information (PII) during the course of their regular business activities. PIPEDA fist came into law in 2000 and must be reviewed by parliament every 5 years. The last update to PIPEDA came into law on November 1, 2018, and for the first time, it included regulations for disclosing a cyber security breach.

Topics: cyber security Compliance Privacy Breach

What is a SOC Audit?

Has this happened to you before? Your business is about to land a big client. Everything is going well, but before they sign the deal, they want you to sign off on a Cyber Security Questionnaire. Not only that, but they have also asked you for a SOC Audit, and you don’t even know what it is.

Topics: cyber security Compliance

Where Does My Information End up Once it’s Stolen?

Topics: cyber security passwords