​   Cary Fox
Independent Insurance Broker

Associated with 

Small Business Cyber threats: What to do


According to the same study, the average cost of a cyber attack on a small or medium-sized business is nearly $200,000. As a result, nearly
60 per cent of the small businesses victimized by a cyber attack permanently close their doors
within six months. 

Not a comforting statistic.  Click on the link below for more information on simple ways to protect your business.

Cyber threats defined: Spam, Phishing and Spyware

   I will be regularly posting relevant articles about keeping protected and      saving money.  Please visit often to see the latest updates 

Don’t Equate Small with Safe
The majority of Canadian small businesses lack a formal Internet security policy for employees, and only about half have cyber security measures in place. This disconnect is largely due to the widespread, albeit mistaken, belief that small businesses are unlikely targets for cyber attacks. In reality, data thieves are simply looking for the path of least resistance. Symantec’s study found that 40 per cent of attacks are against organizations with fewer than 500 employees.

You are vulnerable to hackers obtaining your personal information online.  You don't have to be a computer expert; many tips are merely common sense.  Learn the terms and how to spot potential attacks.

​Spam is any unsolicited electronic content which often contains some form of scam, virus and/or invasive or inappropriate information.  It can be and email, text message or even a phone call.  
You and your staff should ask the following questi
ons while using company email:

  • ​Do you know the sender​?
  • Is the grammar and spelling poor?
  • Is this message drastically different from emails
    ​from a known sender?
  • Does it sound too good to be true?
  • ​Is it in the spam folder?

Suggestions on company policies to reduce the impact of spam:   ​                  (Download the article to see it) 

A phishing scam is a phony email or pop-up message used to lure Internet users into divulging information such as credit card numbers or passwords.  Hackers use this information for identity theft.  Often the email will impersonate a well-known organization or individual.
For company policies to keep employees safe from phishing scams:  

Software that is installed without the user's permission in order to 'spy' and track browsing habits and collect personal information.  Usually it results from the user opening an attachment and/or downloading an infected file from an untrusted source.  ​
Signs to look for that  that spyware is installed on the computer:                        (Download the article to see it)