Facebook tracks its users’ activity across the web. Here’s how to stop it. Among security experts, there’s a …
Category: Newsletter Features
Let’s Talk Network Documentation!
IT documentation is a powerful force when it comes to your business network and overall operations. Done well, …
FBI IC3 Report: Cybercrime Losses Up 48% in 2021
Did You Know? The dark web could now be considered the world’s third largest economy, with experts estimating that cybercrime brought in over $6 trillion in 2021, according to the FBI’s annual Internet Crime Report, which documents cybercrime trends. The Bureau...
Tech Tip: This 2-Second Habit Can Help Keep You Safe!
It may sound simple, but pressing the Windows Key+L when you step away from your computer can save …
“Shadow IT” Could Be Putting Your Company At Risk. Here’s How.
Do your employees use sites like Dropbox, Google Drive, and other personal cloud sharing services to collaborate and …
Three Cybersecurity Resolutions to Jumpstart 2022
Now that we’ve made it through the holidays and into the coldest part of the winter, let’s brighten …
Here’s How to Get Ready to Seek a Cyber Liability Insurance Policy
More Companies Will Be Denied for Cyber Liability Insurance in 2022 than Ever Before—Here’s How to Prepare Cyber liability insurance (also known as cybersecurity insurance or cyber insurance) is soaring in popularity. Why? Businesses are being hit by ransomware and...
Do You Know SBDC?
Business owners should know about the SBDC and their programs. By: Brian Ford, President at Facet Technologies, Inc. I have found over the years that most business owners have not heard of the SBDC. The SBDC (Small Business Development Centers) is a partner...
Your Business Needs a Firewall for Life. Here’s Why.
Facet installs and maintains firewalls as part of their managed security solution. Find out why we recommend a HaaS approach to firewalls. A firewall is the first line of defense against intrusion in your network. Firewalls are a crucial component of your layered...
Blackmail Phishing Scams: 4 Steps to Take if You Receive an Extortion Email
Fear, Lies, and Greed: Blackmail Phishing Scams Play on Embarrassment for Huge Payouts Why am I getting this email? I didn’t do anything wrong! A friend of mine recently sent me a screenshot of an email via text. The subject line was a random string of characters,...
Search
Recent Posts
How Private is That VPN?
And should your business use a VPN? The Truth About Some Popular VPN Apps “Thanks so much to (insert VPN provider here) for sponsoring this video.” Sound familiar? VPNs bill themselves as a safeguard against getting your identity stolen on the internet, but many...
Zero Trust: What Business Leaders Should Know
Think of traditional security like a castle with strong outer walls, moats, sentries, maybe a dragon - you get the idea. In this castle, once someone's inside, they can move around freely. But what if the castle's not made of stone and sectioned neatly off on its own...
Cyber Treats: Online Shopping and Mobile Device Management
3 Tips for Safer Online Shopping According to the FTC, shopping scams were the second-most reported in the US in 2023--and they're at their worst during the holidays. According to TransUnion’s 2022 Global Digital Fraud Trends report, there was a 127% increase in daily...
Cyber Treats: Ready for a Quiz?
CONGRATULATIONS to the winner of the October Popcorn Giveaway, Jenni of JM Industrial Supply! Watch for our next drawing in November--you could be our next winner! Ready to put that cybersecurity knowledge to the test? We've put together a Halloween-themed...
Cyber Treats: Cybersecurity, IRL
More than software stacks and complex passwords. Some cybersecurity vulnerabilities are surprisingly simple—and visible. These tips go beyond the virtual. Let’s go irl! A goofy desktop background is the best-case scenario here… Before you step away from your desk,...