What is Penetration Testing? Simply put, it’s legal hacking. Penetration testing (pen testing, for short) involves all aspects of your computer system, subjecting it to every trick a hacker might try, discovering your vulnerabilities and removing those vulnerabilities...
Category: Facet News
Web Designer vs. Web Developer: What’s the Difference?
Many people use these terms interchangeably, but they are distinct job titles. Web Designers are the creative artists; the people who make it pretty. Web Developers are the tech experts; the people who make it function. Choosing between Design and Development The...
Understanding Web Applications and Why Your Company Needs Them
A web application (app, for short) is software that runs in multiple locations from a remote server. Unlike installed software, apps need an Internet connection to work. For example, Facebook (social media) and Wikipedia (reference) are apps, but MSWord (word...
How a Good Website Design Can Increase your Conversions
We love what we do, that’s why we’re in business, right? Wrong!!! We’re in business to make money. We have bills to pay and our business does that. If you have a website that isn’t converting page views into sales, it isn’t doing its job, so fire it and hire a new...
4 Ways to Tell if Your Website is Secure
There is bad news, and there is good news: The Bad News — you can’t, not absolutely. You’ve heard the phrase, “It’s impossible to make something foolproof because fools are so clever”. Cyber-criminals are equally clever; some are brilliant. If they want in that bad,...
The Vital Stages of the Software Development Cycle
First, let’s get one thing straight: Software is never done. Individual projects are completed, but business needs changes, the industry changes and available technologies change. So, let’s look at the 6 vital steps that comprise the Facet Web Tech software...
Important Rules for Effective Web Design
There are numerous sites that will help you create your own website, but not one that explains how to perform heart surgery on yourself. What does medicine know that IT hasn’t figured out? Simply put: Leave professional work to the professionals. Web design isn’t...
5 For-Sure Signs that your Site has been Hacked
1. You Get a Ransom Demand No joke, site-napping is real and growing. It’s profitable because ransomware users are hard to track down and many people assume it’s easier to pay off and be done than to wait for the site-nappers to be caught, and to hope that, once...
Show’em What You Got!
A generation ago, TV commercials were the exclusive realm of big companies with big budgets. Technology has changed all that. Today, your smartphone or digital camera is almost as good as anything in Hollywood, and videos posted on YouTube, your own website or social...
Bot, Bot, Who Got the Bot?
A bot ("web robot") is a software application that runs automated tasks over the Internet. Most are harmless and useful; some are like viruses. If you’re worried about getting infected — and you need to be — Facet Web Tech can inoculate you. Cybersecurity is VitalJust...
Search
Recent Posts
Cyber Treats: MFA Where?!
GIVEAWAY! We're asking for your feedback on topics for Cyber Treats and giving away a big popcorn tin from Young's Popcorn Heaven. Click the link at the bottom to enter! We're all familiar with that pesky little pop-up that appears on...
How To Audit Cybersecurity Awareness WITHOUT Disrupting Operations
Smart business owners aren’t only investing in cybersecurity products and software packages to keep their data safe: they’re keeping tabs on their teams’ cybersecurity awareness. It’s even smarter to think of this practice as part of your security stack. If you’re...
5 Phishing “Cues” Cybersecurity Experts Always Notice
Welcome to the new Cyber Treats Weekly. We'll be sharing valuable tech tips, cybersecurity practices, and current information that you can share with your team (featuring Maggie and Boomer, cartoon versions of Facet's "shop dogs.") Now, onto the tips! It pays to...
Secure Infrastructure: Mitigate Your Network Security Vulnerabilities
The statistics on cyberattacks are staggering. Around 3.4 billion phishing emails are sent daily. Over 4 million websites are infected with malware. These attacks target businesses of all sizes in all industries. Mitigating your network security vulnerabilities can...
6 Common Types of Data Breaches (And How to Stay Safe From Them)
The internet has the power to connect us with the world around us, whether it’s across the globe or just across the street. With more and more people turning to the internet to find information, work, and shop, the potential for data breaches also grows. Data from IBM...