What is Penetration Testing? Simply put, it’s legal hacking. Penetration testing (pen testing, for short) involves all aspects of your computer system, subjecting it to every trick a hacker might try, discovering your vulnerabilities and removing those vulnerabilities...
Category: Facet News
Web Designer vs. Web Developer: What’s the Difference?
Many people use these terms interchangeably, but they are distinct job titles. Web Designers are the creative artists; the people who make it pretty. Web Developers are the tech experts; the people who make it function. Choosing between Design and Development The...
Understanding Web Applications and Why Your Company Needs Them
A web application (app, for short) is software that runs in multiple locations from a remote server. Unlike installed software, apps need an Internet connection to work. For example, Facebook (social media) and Wikipedia (reference) are apps, but MSWord (word...
How a Good Website Design Can Increase your Conversions
We love what we do, that’s why we’re in business, right? Wrong!!! We’re in business to make money. We have bills to pay and our business does that. If you have a website that isn’t converting page views into sales, it isn’t doing its job, so fire it and hire a new...
4 Ways to Tell if Your Website is Secure
There is bad news, and there is good news: The Bad News — you can’t, not absolutely. You’ve heard the phrase, “It’s impossible to make something foolproof because fools are so clever”. Cyber-criminals are equally clever; some are brilliant. If they want in that bad,...
The Vital Stages of the Software Development Cycle
First, let’s get one thing straight: Software is never done. Individual projects are completed, but business needs changes, the industry changes and available technologies change. So, let’s look at the 6 vital steps that comprise the Facet Web Tech software...
Important Rules for Effective Web Design
There are numerous sites that will help you create your own website, but not one that explains how to perform heart surgery on yourself. What does medicine know that IT hasn’t figured out? Simply put: Leave professional work to the professionals. Web design isn’t...
5 For-Sure Signs that your Site has been Hacked
1. You Get a Ransom Demand No joke, site-napping is real and growing. It’s profitable because ransomware users are hard to track down and many people assume it’s easier to pay off and be done than to wait for the site-nappers to be caught, and to hope that, once...
Show’em What You Got!
A generation ago, TV commercials were the exclusive realm of big companies with big budgets. Technology has changed all that. Today, your smartphone or digital camera is almost as good as anything in Hollywood, and videos posted on YouTube, your own website or social...
Bot, Bot, Who Got the Bot?
A bot ("web robot") is a software application that runs automated tasks over the Internet. Most are harmless and useful; some are like viruses. If you’re worried about getting infected — and you need to be — Facet Web Tech can inoculate you. Cybersecurity is VitalJust...
Search
Recent Posts
IT Compliance in Central Illinois: What Every Business Owner Must Know
Your competitor down the street just lost their largest client. Not because of service quality. Not because of pricing. Because they failed a compliance audit. In Peoria and across Central Illinois, compliance failures cost businesses $2.3 million on average. Most...
Cyber Treats – Scary Cyber Stories to Tell in the Dark
Enter if You Dare. Ringing the doorbell AND saying "trick or treat," also counts as 2FA, just FYI. This Year's Cybersecurity Nightmares We don't like to get too spooky here at Cyber Treats, but this year had sophisticated attacks, massive breaches, and threats...
Co-Managed IT in Peoria: When Your Internal Team Needs Backup (Not Replacement)
You hired a skilled IT person. They keep the lights on, handle password resets, and manage your daily technology needs. But lately, they're drowning in security alerts, struggling to stay ahead of compliance requirements, and working nights to patch vulnerabilities...
Why Business Continuity Planning Matters
Your server just crashed. Ransomware hit overnight. Hardware failed. How long until your Peoria business is operational again? If you're guessing, you don't have continuity—you have hope. Hope isn't a recovery strategy for Central Illinois businesses. What Business...
Which Compliance Framework Does Your Central Illinois Business Actually Need?
A straight answer to PCI, HIPAA, CMMC, and FEDRAMP requirements for Peoria-area companies You process credit cards. Does that trigger PCI requirements? Your facility handles patient records. Does HIPAA apply? You bid on government contracts. Is CMMC mandatory? These...
