1. Home /
  2. Businesses /
  3. BBI Informatique Inc.


Category

General Information

Phone: +1 514-346-1424



Website: Bbi-info.com/

Likes: 61

Reviews

Add review



Facebook Blog

BBI Informatique Inc. 24.11.2020

social post test

BBI Informatique Inc. 13.11.2020

Be vary wary of phishing site, RBC example from this morning Note Name in address bar, note errors on screen Bark Accounts, Cnedit Cands. Stupid mistakes Always be vigilent, ... They never ever ask you for this information In email received today " We've noticed that some of your account information appears to be missing. To avoid service interruption please sign in to the RBC login page and verify your account before 16/09/2017. " It was followed by the phishing link (no i will not post it so you can try it out) I am a professional, and opened the link on a separate secure environment. DON'T EVER TRY THIS AT HOME! #RBC

BBI Informatique Inc. 29.10.2020

Cyber security, want to know more Contact me. Veuillez savoir plus, contacter moi

BBI Informatique Inc. 13.10.2020

Major cyberattack spreads from the United Kingdom Summary The WannaCry malware attack that started in the United Kingdom on May 12, 2017 has reportedly spread to more than 70 countries, including the United States of America, Italy, China and Russia. The attack exploits a Microsoft Windows vulnerability dubbed 'EternalBlue' (MS17-010) that was recently leaked to the public by the Shadow Brokers hacker group. The vulnerability allows the malware to encrypt files, folders, an...d drives, rendering them unusable. The malware also produces a message demanding a ransom payment in bitcoin in exchange for a decryption key. Hackers have been able to access computer networks through phishing attempts using emails and infected attachments. Multiple reports suggest that most of the WannaCry attacks have featured infected .zip files. Advice Observe strict cybersecurity precautions: Do not open email attachments from unfamiliar or untrustworthy sources. If possible, temporarily refrain from sending attachments Immediately report any suspicious communications or activity . Ensure that computers and mobile devices are running the latest available operating system and have the latest security patches installed. Update security software on your devices.