What is Penetration Testing? Simply put, it’s legal hacking. Penetration testing (pen testing, for short) involves all aspects of your computer system, subjecting it to every trick a hacker might try, discovering your vulnerabilities and removing those vulnerabilities...
Category: Facet News
Web Designer vs. Web Developer: What’s the Difference?
Many people use these terms interchangeably, but they are distinct job titles. Web Designers are the creative artists; the people who make it pretty. Web Developers are the tech experts; the people who make it function. Choosing between Design and Development The...
Understanding Web Applications and Why Your Company Needs Them
A web application (app, for short) is software that runs in multiple locations from a remote server. Unlike installed software, apps need an Internet connection to work. For example, Facebook (social media) and Wikipedia (reference) are apps, but MSWord (word...
How a Good Website Design Can Increase your Conversions
We love what we do, that’s why we’re in business, right? Wrong!!! We’re in business to make money. We have bills to pay and our business does that. If you have a website that isn’t converting page views into sales, it isn’t doing its job, so fire it and hire a new...
4 Ways to Tell if Your Website is Secure
There is bad news, and there is good news: The Bad News — you can’t, not absolutely. You’ve heard the phrase, “It’s impossible to make something foolproof because fools are so clever”. Cyber-criminals are equally clever; some are brilliant. If they want in that bad,...
The Vital Stages of the Software Development Cycle
First, let’s get one thing straight: Software is never done. Individual projects are completed, but business needs changes, the industry changes and available technologies change. So, let’s look at the 6 vital steps that comprise the Facet Web Tech software...
Important Rules for Effective Web Design
There are numerous sites that will help you create your own website, but not one that explains how to perform heart surgery on yourself. What does medicine know that IT hasn’t figured out? Simply put: Leave professional work to the professionals. Web design isn’t...
5 For-Sure Signs that your Site has been Hacked
1. You Get a Ransom Demand No joke, site-napping is real and growing. It’s profitable because ransomware users are hard to track down and many people assume it’s easier to pay off and be done than to wait for the site-nappers to be caught, and to hope that, once...
Show’em What You Got!
A generation ago, TV commercials were the exclusive realm of big companies with big budgets. Technology has changed all that. Today, your smartphone or digital camera is almost as good as anything in Hollywood, and videos posted on YouTube, your own website or social...
Bot, Bot, Who Got the Bot?
A bot ("web robot") is a software application that runs automated tasks over the Internet. Most are harmless and useful; some are like viruses. If you’re worried about getting infected — and you need to be — Facet Web Tech can inoculate you. Cybersecurity is VitalJust...
Search
Recent Posts
Switching IT Providers in Peoria: What to Expect When You Move to Facet
Switching IT providers does not have to be painful — but it does require a plan. In our experience, the vast majority of transitions are completed within 30 days for small and mid-sized businesses across Peoria and Central Illinois. The only time it runs longer is...
CMMC 2.0 Compliance for Manufacturers: What Central Illinois Defense Contractors Need to Know
The Time for Adoption is Now CMMC 2.0 certification is now required for manufacturers bidding on Department of Defense contracts in 2026. Phase 1 implementation began November 10, 2025, which means self-assessments are already appearing in new solicitations across the...
Why Central Illinois Manufacturers Are Prime Targets for Cyber Attacks in 2026
Central Illinois manufacturers face growing cyber threats because they combine high-value intellectual property, operational technology that's difficult to update, and connections to larger supply chains. Attackers know that production downtime costs manufacturers...
AI-Fluent Leaders: A Practical AI Webinar Series for Business Owners and Executives
AI isn't waiting for you to figure it out. It's already in your business—whether you've approved it or not. Your employees are experimenting with ChatGPT, Microsoft Copilot, and automation tools right now. Some are saving time. Others might be exposing sensitive data...
How to Choose the Right Cybersecurity Provider in Peoria, IL: A Central Illinois Business Owner’s Guide
The recent rise in ransomware attacks targeting Central Illinois businesses has made one thing clear: cybersecurity is no longer optional. Whether you're running a manufacturing facility in East Peoria, a medical practice in Bloomington, or an agriculture business in...
