Quick Intelligence Blog

Here’s Another Job Seeker Scam to Watch Out For

The CBC News has recently reported on a scam targeting job seekers. The scam works by offering desperate job seekers an amazing “work from home” opportunity. They are also told that the company will send them a cheque to purchase office supplies from a third party and are instructed to e-transfer the money to that third party. The problem is that the job offer isn’t real, the cheques are bad, and once the cheque bounces, you are on the hook for the money.

Topics: Phishing cyber security Privacy

If Your Small Business isn’t Investing in Cyber Security, You’re in Danger of Losing Your Money

You’ve seen some of the headlines regarding big cyber security breaches. Colonial Pipeline paid a huge ransom to get their data back and get the gas flowing again. JBS Meat also suffered an attack that shut down production for days.

Topics: Backups Ransomware Phishing cyber security Cyber Insurance Multifactor Authentication

How Are My Employees a Risk To Our Cyber Security

Most business owners know they need to be protected from outside threats, but did you know you’re your employees could also be a threat? So how are your employees a risk? Is there anything you can do to mitigate that risk?

Topics: Insider Ransomware Phishing cyber security passwords

Why you Need to Create a Positive Cyber Security Environment

You may have heard about companies who take to shaming employees who have unintentionally caused a cyber incident at work. While it’s true that all it takes is one wrong click by a staff member, shaming staff isn’t the way to better cyber security.

Topics: Phishing cyber security

Are Businesses Losing the War Against Phishing Attacks?

What are phishing attacks? Phishing attacks are a social engineering method to either fraudulently obtain your information or to trick you into downloading malware. The goal of the phisher is to compromise your network or data. Phishing attacks work because they disguise their communication or web pages as being from a trusted source, making you believe the request is real and prompting you to take an action like clicking on a bad link or giving up information.

Topics: Phishing