Facebook tracks its users’ activity across the web. Here’s how to stop it. Among security experts, there’s a …
Category: Newsletter Features
Let’s Talk Network Documentation!
IT documentation is a powerful force when it comes to your business network and overall operations. Done well, …
FBI IC3 Report: Cybercrime Losses Up 48% in 2021
Did You Know? The dark web could now be considered the world’s third largest economy, with experts estimating that cybercrime brought in over $6 trillion in 2021, according to the FBI’s annual Internet Crime Report, which documents cybercrime trends. The Bureau...
Tech Tip: This 2-Second Habit Can Help Keep You Safe!
It may sound simple, but pressing the Windows Key+L when you step away from your computer can save …
“Shadow IT” Could Be Putting Your Company At Risk. Here’s How.
Do your employees use sites like Dropbox, Google Drive, and other personal cloud sharing services to collaborate and …
Three Cybersecurity Resolutions to Jumpstart 2022
Now that we’ve made it through the holidays and into the coldest part of the winter, let’s brighten …
Here’s How to Get Ready to Seek a Cyber Liability Insurance Policy
More Companies Will Be Denied for Cyber Liability Insurance in 2022 than Ever Before—Here’s How to Prepare Cyber liability insurance (also known as cybersecurity insurance or cyber insurance) is soaring in popularity. Why? Businesses are being hit by ransomware and...
Do You Know SBDC?
Business owners should know about the SBDC and their programs. By: Brian Ford, President at Facet Technologies, Inc. I have found over the years that most business owners have not heard of the SBDC. The SBDC (Small Business Development Centers) is a partner...
Your Business Needs a Firewall for Life. Here’s Why.
Facet installs and maintains firewalls as part of their managed security solution. Find out why we recommend a HaaS approach to firewalls. A firewall is the first line of defense against intrusion in your network. Firewalls are a crucial component of your layered...
Blackmail Phishing Scams: 4 Steps to Take if You Receive an Extortion Email
Fear, Lies, and Greed: Blackmail Phishing Scams Play on Embarrassment for Huge Payouts Why am I getting this email? I didn’t do anything wrong! A friend of mine recently sent me a screenshot of an email via text. The subject line was a random string of characters,...
Search
Recent Posts
Cyber Treats: MFA Where?!
GIVEAWAY! We're asking for your feedback on topics for Cyber Treats and giving away a big popcorn tin from Young's Popcorn Heaven. Click the link at the bottom to enter! We're all familiar with that pesky little pop-up that appears on...
How To Audit Cybersecurity Awareness WITHOUT Disrupting Operations
Smart business owners aren’t only investing in cybersecurity products and software packages to keep their data safe: they’re keeping tabs on their teams’ cybersecurity awareness. It’s even smarter to think of this practice as part of your security stack. If you’re...
5 Phishing “Cues” Cybersecurity Experts Always Notice
Welcome to the new Cyber Treats Weekly. We'll be sharing valuable tech tips, cybersecurity practices, and current information that you can share with your team (featuring Maggie and Boomer, cartoon versions of Facet's "shop dogs.") Now, onto the tips! It pays to...
Secure Infrastructure: Mitigate Your Network Security Vulnerabilities
The statistics on cyberattacks are staggering. Around 3.4 billion phishing emails are sent daily. Over 4 million websites are infected with malware. These attacks target businesses of all sizes in all industries. Mitigating your network security vulnerabilities can...
6 Common Types of Data Breaches (And How to Stay Safe From Them)
The internet has the power to connect us with the world around us, whether it’s across the globe or just across the street. With more and more people turning to the internet to find information, work, and shop, the potential for data breaches also grows. Data from IBM...