Learn More

Quick Intelligence Blog

What is Social Engineering

Have you heard of social engineering? If you are worried that it is something complicated and technical, have no fear, it’s not. Social engineering is as old as time itself and doesn’t need fancy technology. Criminals and fraudsters use social engineering techniques to trick people into giving them access to restricted areas. Once the criminal has gained access, they can then use that access to commit whatever crime they wish.

Topics: Phishing cyber security Breach

How to Improve Your Business’s Cybersecurity Without Blowing Your Budget

Cybersecurity is a must for today’s connected businesses. One of the biggest challenges, especially for smaller businesses, is the lack of financial resources to help defend against a cyber-attack. However, there are some tips that a business of any size, but especially a smaller business, can utilize to help protect themselves from a cyber-attack without blowing your budget.

Topics: Backups Phishing cyber security passwords Multifactor Authentication Anti-Virus

Quick Intelligence and ZeroFox Partner to Provide Cybersecurity Solutions to Canadian Businesses



ZeroFox announced yesterday that Quick Intelligence will be their Canadian Partner to extend their delivery of critical threat intelligence, digital risk protection, and adversary disruption services in Canada.

Topics: Ransomware Phishing cyber security Breach Cloud

LinkedIn Scams You Need to Worry About

Scams on social media are not uncommon, but when it comes to LinkedIn, people tend to be more willing to share personal information in the hopes of acquiring a new job or business lead. This is why you need to be even more vigilant about protecting your personal information when using LinkedIn.

Topics: Phishing cyber security

Here’s Another Job Seeker Scam to Watch Out For

The CBC News has recently reported on a scam targeting job seekers. The scam works by offering desperate job seekers an amazing “work from home” opportunity. They are also told that the company will send them a cheque to purchase office supplies from a third party and are instructed to e-transfer the money to that third party. The problem is that the job offer isn’t real, the cheques are bad, and once the cheque bounces, you are on the hook for the money.

Topics: Phishing cyber security Privacy

If Your Small Business isn’t Investing in Cyber Security, You’re in Danger of Losing Your Money

You’ve seen some of the headlines regarding big cyber security breaches. Colonial Pipeline paid a huge ransom to get their data back and get the gas flowing again. JBS Meat also suffered an attack that shut down production for days.

Topics: Backups Ransomware Phishing cyber security Cyber Insurance Multifactor Authentication

How Are My Employees a Risk To Our Cyber Security

Most business owners know they need to be protected from outside threats, but did you know you’re your employees could also be a threat? So how are your employees a risk? Is there anything you can do to mitigate that risk?

Topics: Insider Ransomware Phishing cyber security passwords

Why you Need to Create a Positive Cyber Security Environment

You may have heard about companies who take to shaming employees who have unintentionally caused a cyber incident at work. While it’s true that all it takes is one wrong click by a staff member, shaming staff isn’t the way to better cyber security.

Topics: Phishing cyber security

Are Businesses Losing the War Against Phishing Attacks?

What are phishing attacks? Phishing attacks are a social engineering method to either fraudulently obtain your information or to trick you into downloading malware. The goal of the phisher is to compromise your network or data. Phishing attacks work because they disguise their communication or web pages as being from a trusted source, making you believe the request is real and prompting you to take an action like clicking on a bad link or giving up information.

Topics: Phishing