Facet Technologies Logo

(309) 689-3900

Call our office!

3024 W. Lake Ave., Suite 1

Peoria, IL 61615

8:00AM - 5:00PM

Monday – Friday

Cyber Treats: Ready for a Quiz?

CONGRATULATIONS to the winner of the October Popcorn Giveaway, Jenni of JM Industrial Supply! Watch for our next drawing in November–you could be our next winner!

Ready to put that cybersecurity knowledge to the test?

We’ve put together a Halloween-themed cybersecurity trivia quiz for you! Test your own knowledge or share with your team for some spooky fun!

Watch the video version on YouTube here.

Or use this link for a presentable version on Canva (great for groups trivia).

In The News: Healthcare Hacks

The healthcare industry continues to be a top target for hackers. UnitedHealth just released more information on their February incident: it affected over 100 million customers and they are still notifying affected parties. In September, an entire ER in Texas was shut down due to attack. This week, a hospice pharmacy company in Arizona experienced a breach.

Healthcare data remains a valuable commodity on the black market–with health records regularly fetching more than 10 times the amount of credit card information.

For organizations in the healthcare space, the message is clear: it pays to keep your systems secure as hacking groups see health systems as lucrative targets.

Need some cybersecurity advice for the healthcare industry, or any industry? We’re expert problem solvers for IT and cybersecurity. Schedule a discovery call with Trey by clicking here.

Cyber Treats: Cybersecurity, IRL

More than software stacks and complex passwords.

Some cybersecurity vulnerabilities are surprisingly simple—and visible. These tips go beyond the virtual. Let’s go irl!

A goofy desktop background is the best-case scenario here…

Before you step away from your desk, take two seconds to lock your computer (Windows key + L on PC, Control + Command + Q on Mac), especially if you’re working in a public place. Why? In those few minutes you’re gone, anyone could:

– Send emails as you

– Access sensitive company files

– View confidential client information

– Install harmful software

Make it a habit to “lock it up” every time you leave your PC.

When the server room is also your waiting room…

Did you know that penetration tests often include a physical access component? Pen testers will mimic the tactics real hackers use to attempt to access servers and other equipment, posing as your IT provider, internet provider, or just walking right in your office.

To prevent physical access to your data, some security measures to consider include:

– A clear visitor policy (who can enter, when, and why?)

– Sign-in procedures for guests

– Employee ID badges or key cards

– After-hours access protocols

– Regular audits of who has keys or access codes

Note: if someone who says they’re a technician from Facet shows up unexpectedly, you can always give us a call to make sure they’re legit.

Quick Action: Walk your office today. Are visitors wandering freely? Are computers left unlocked? Who has office keys?

Start with these basics, and you’ve already closed two major vulnerability gaps.


Just Something Fun (and Maybe Frustrating?)

Challenge your friends or family to neal.fun’s Password Game.


? TRADE OFFER! ?
We receive: your feedback about the future of Cyber Treats.
You receive: a chance to win a popcorn tin from Popcorn Heaven!

We’re doing another Cyber Treats popcorn giveaway for October! We appreciate our subscribers and want to make sure Cyber Treats is sharing information relevant to YOU!

Fill out this quick survey to share your thoughts on Cyber Treats for a chance to win a large tin of popcorn from Young’s Popcorn Heaven (it’s SO good).

Want extra entries? Each person you refer to Cyber Treats earns you one additional entry to the popcorn drawing. Forward them this email and have them fill out the Popcorn Drawing form to enter and subscribe to the newsletter.

Contest ends 10/31/2024. See site for terms and conditions.


Want some advice on business cybersecurity? Our team is here to help with solutions to keep your business’ data safe. Call us at (309) 689-3900 or schedule a discovery call with Trey to see what your options are for managed services and cybersecurity.

Cyber Treats: QR Codes and How to Scan for Scams

QR codes are convenient, but cybercriminals use them for scams, too—usually to get you to download malware or reveal sensitive information. Protect yourself from QR phishing scams with these quick tips:

  1. Inspect the source: Only scan codes from trusted entities.

  2. Check the URL: If you use your phone’s camera to scan QR codes, the link should pop up in the middle of your screen. Before clicking, ensure the link looks legitimate.

  3. Use the right app: If your camera app doesn’t allow you to preview links, install a QR scanner app like Binary Eye.

  4. Be wary of unsolicited codes: Don’t scan random QR codes in public or emails. There have been cases of scammers putting outrageous posters up on the street to try and steal information through QR code scans.

  5. Keep devices updated: This helps defend against newly discovered vulnerabilities.

Remember: When in doubt, don’t scan, especially if you can’t verify the source of the QR code.

Did You Know? Targeted Ads, Data Privacy and Your Teen

When children turn 13, they age out of the Children’s Online Privacy Protection Act (COPPA). This means that companies can assign your teen an advertising ID that tracks them across the web using their phone, Google account, and more, and sell their information to data brokers. Scary? Yes!

The EFF (Electronic Frontier Foundation) has a guide on how to remove these IDs from your kids’ devices here. It’s worthwhile to check, even on devices for kids under 13, and on school-issued devices, to decrease their security risks on the web.

Want some advice on business cybersecurity? Our team is here to help with solutions to keep your business’ data safe. Call us at (309) 689-3900 or schedule a discovery call with Trey to see what your options are for managed services and cybersecurity.

Cyber Treats: Afraid of the Dark (Web)?

Welcome to our new subscribers who we met at this week’s ILA conference!

What exactly is the dark web?

The internet is comprised of layers. The surface web, or what we most likely think of when we imagine “the internet,” is only the tip of the iceberg. Beyond that, lies what is called the “deep web,” and beyond that, the “dark web.”

Surface Web:

  • Publicly accessible websites indexed by search engines
  • Examples: news sites, social media, online shops

Deep Web:

  • Content not indexed by standard search engines
  • Requires specific access or credentials
  • Much larger than the surface web
  • Examples: academic databases, medical records, private social media content

Dark Web:

  • A small portion of the deep web that requires a special browser like Tor to access
  • Intentionally hidden and anonymous
  • Contains both legitimate and illegal activities
  • Examples: whistleblowing platforms, illegal marketplaces

The Dark Web and You

Even if you don’t access the dark web, you can feel its affects. Most modern identity theft happens through dark web marketplaces, and it’s likely that you have passwords and logins in “combolists” for sale by hackers.

What’s there to do about it?

It’s nearly impossible to avoid EVERY website data breach, but take steps to mitigate the damage.

Check periodically for dark web password breaches. We offer free dark web reports with information about compromised accounts—just reach out here and we will send you a custom report.

Use different passwords for each website. List buyers will run credentials through most common websites to check for repeat passwords—and exploit what they find there.

In the News: Internet Archive Hacked

Yesterday, the Internet Archive/The Wayback Machine, which stores screen captures of sites through the years, was hacked. Side note: normally, I read about hacks in the news. This time, I found out when I tried to find an old restaurant review referenced in an episode of Kitchen Nightmares. The hacker posted a JavaScript message to visitors reading, “Have you ever felt like the Internet Archive runs on sticks and is constantly on the verge of suffering a catastrophic security breach? It just happened. See 31 million of you on HIBP!” (Have I Been Pwned is free data breach notification service).

The stolen passwords are encrypted, but can be referenced against previous uses of the same password. If you’re reusing passwords, time to switch it up. At this time, the hackers still have control of the site.

Cyber Treats Weekly: The Truth About Vendor Cybersecurity



The Solution? Start Asking the Hard Questions.

In the News: Background Check Data Exposed (Again)

Congratulations to Our Giveaway Winner!


Feedback?

    Cyber Treats: AI Tools That Live Up to the Hype

    There are a LOT of AI tools out there, but sometimes an AI tool really is worth all the hype. We’re sharing three tools our team loves and uses regularly, and some quick AI tips and tricks.

    a cartoon of a dog saying "all I hear is Chat GPT this, Copilot that... I think they call it artificial 'cause it's not that smart." The next panel shows the same dog sitting up and begging for a bag of chips, and is captioned "hearing a chip bag open from across the house... Now that's some REAL intelligence."
    reads "the opinions expressed in the comic belong solely to the cyber treats dogs and do not always reflect the views of Facet. We like AI. We also never get caught rooting through the trash."

    Synthesia.io for AI-Generated Videos

    We’ve used Synthesia for a few videos on our ticket system, FacetTRAK (you can see them at FacetTRAK.com). Their avatars are surprisingly lifelike (especially their most recent additions) and the voices don’t sound like robots—no Siri/Bixby here. I found the editing to be quick and easy. If you, like us, prefer staying off-camera, this is a great way to make video content.

    Scribe

    Scribe is our development team’s go-to tutorial maker. It records your screen while you perform any task and turns it into step-by-step documentation. You can then edit the document if needed. Fast, simple, incredibly helpful and time-saving.

    Claude: a Brainstorming/Outlining Pal

    I’ve yet to find an AI tool that can really replace an actual human “voice,” but the one that comes closest for me is Claude, a large language model (LLM) with a free tier and a more advanced paid tier. Here are some things I think it excels at:

    1. Outlines: I use Claude to outline blog posts and articles. It can turn a brainstorming document into an outline instantly, so you can start writing faster.

    2. Working Off Other Documents: Claude lets you upload whole documents to use as a reference or to proofread—this is great for converting, say, a blog post into a Facebook post, or checking for typos. Just don’t upload anything confidential–I stick to things that will be posted publicly.

    3. Sounding Like a Real Person: Claude is good at understanding niche subjects and avoids predictable AI tropes. If you’ve been unimpressed with the robotic tone of ChatGPT, I’d recommend trying Claude. It’s often said to sound more “human” out of the box.

    Quick Tips:

    Fake Your Excel Power User Status: ChatGPT and other LLMs tend to be pretty good at providing Excel/Google Sheets formulas. Use plain English to explain what you’d like to do, and save that time you would have spent down a Google rabbit hole.

    Social Media Posts, Faster: Canva, the free social media/creative tool, has some new AI features that blew me away, including image editing abilities and background removal that used to require manual work and lots of patience, and AI-powered image generation.

    YMMV: Having AI help with your fantasy football (soccer) picks. Have ChatGPT help build a workout (just don’t expect it to replace your personal trainer). Have ChatGPT plan some meals (use your discretion, obviously, and take the Google AI recommendations with a grain of salt).

    Need a Business Continuity Plan? Start Here

    In case of disaster, what’s your safety net?

    Regulations from the government and insurance companies are making business continuity a hot topic. If you find you’re suddenly in need of a Business Continuity Plan (BCP), working with a managed service provider might be the right choice.

    For smart business owners, a robust BCP is not just a safety net—it’s a necessity, and with the increasing prevalence of cyber threats, integrating cybersecurity into your BCP is essential. Here’s how to get started.

    Intro to BCPs

    A Business Continuity Plan outlines procedures and instructions an organization must follow in the face of disaster, whether natural disaster, fire, or cyberattack. The goal is to ensure that critical business functions continue to operate or are quickly restored to minimize downtime and financial loss.

    Why Cybersecurity is a Crucial Part of Any BCP

    Cybersecurity threats are among the most significant risks to business continuity today. Cyberattacks can lead to data breaches, financial loss, and reputational damage. By incorporating cybersecurity measures into your BCP, you can protect your business from these threats and ensure a swift recovery if an attack occurs. Most insurance providers who require a BCP outline cybersecurity measures your company needs to take to be insured against cyberattack.

    Steps to Develop a Cybersecurity-Focused BCP

    1. Risk Assessment Begin by identifying potential cyber threats to your business. This includes malware, phishing attacks, ransomware, and insider threats. Assess the likelihood and impact of each threat to prioritize your efforts.
    2. Business Impact Analysis (BIA) Conduct a BIA to determine the potential effects of a cyber incident on your business operations. Identify critical functions and processes, and estimate the financial and operational impact of disruptions.
    3. Develop Response Strategies Create strategies to respond to identified risks. This includes incident response plans, data backup procedures, and communication plans. Ensure that your response strategies are comprehensive and cover all aspects of your business.
    4. Implement Cybersecurity Measures Invest in robust cybersecurity measures to protect your business. This includes firewalls, antivirus software, encryption, and multi-factor authentication. Regularly update and patch your systems to protect against new threats.
    5. Employee Training Your employees are your first line of defense against cyber threats. Provide regular training on cybersecurity best practices, such as recognizing phishing emails and using strong passwords. Encourage a culture of security awareness within your organization.
    6. Regular Testing and Updates A BCP is not a one-time effort. Regularly test your plan through simulations and drills to ensure its effectiveness. Update your plan as your business grows and new threats emerge. Continuous improvement is key to maintaining a resilient business.

    Choosing the Right MSP to Help You

    Partnering with a managed IT service provider can significantly enhance your cybersecurity posture. If you partner with Facet, our team can help you develop, implement, and maintain your BCP, ensuring that your business is protected against the latest threats. We also provide 24/7 monitoring and support, giving you peace of mind that your business is in good hands (check out our previous post on how to pick the right helpdesk service).

    A well-crafted Business Continuity Plan is essential for any business owner looking to safeguard their operations against cyber threats. By integrating cybersecurity into your BCP, you can ensure that your business remains resilient in the face of adversity. Start today by assessing your risks, developing response strategies, and partnering with experts to protect your business. Your future self will thank you.

    Ready to Create Your BCP? We’re Here to Help.

      Cyber Treats: Where You Save Matters

      GIVEAWAY! We’re asking for your feedback on topics for Cyber Treats and giving away a big popcorn tin from Young’s Popcorn Heaven. Click the link at the bottom to enter!


      Personal Cloud Storage: the Cost of Convenience

      How many employees use unsanctioned cloud servers? According to a report by Statista, at least 35% of employees use unapproved file storage solutions like Dropbox.

      The Risks:
      What’s at risk? Using Dropbox, personal Google Drive accounts, and other personal cloud storage can lead to data breaches or unauthorized access to sensitive information. Some things to consider:

      Your Data, Where?
      Businesses have limited control over data stored in public cloud services. This means data is often synced across personal devices without oversight or even inadvertently shared with unauthorized parties.

      Compliance Woes
      Public cloud services may not comply with industry-specific regulations and standards, which can lead to legal troubles for your company.

      Offboarding Concerns
      When employees use personal cloud storage, important documents and files can be lost forever if they leave.

      The Solution:
      A solution like Microsoft OneDrive gives your team all the capabilities they want for file sharing and cloud storage, with essential enhanced security features. Education is key to convincing your team to ditch the personal cloud storage and get onboard with OneDrive’s convenience and flexibility.

      Accessibility and Seamless Integration:
      Whether at home, the office, or on the go, you can retrieve documents using any device (computer, smartphone, or tablet).

      Security:
      Cloud storage provides secure backup, reducing the risk of data loss due to hardware failure or theft. Business solutions like OneDrive offer advanced management features, such as detailed access controls and audit logs, to help avoid rolling out the welcome mat for snoops and hackers.

      Collaboration:
      Employees can collaborate on shared documents in real time in Microsoft Word, Excel, PowerPoint and more.

      Educating your team on the advantages of using the right cloud storage is an essential part of your business continuity and data safety playbook.

      As always, if you have any questions, simply reply to this email or give us a call at (309) 689-3900. We have more resources on OneDrive and other file storage and sharing options available to you.

      Already have OneDrive? Check out these features!

      a graphic with six benefits of onedrive cloud storage for business: seamless integration with O365 apps, file sharing and real-time collaboration, automatic backup and synce, teams collaborate smarter with sharepoint libraries, mobile and offline file access, and plenty of space for storing and sharing with 1TB total storage and up to 15gb per file.

      There’s still time to enter the Cyber Treats Popcorn Giveaway!

      Fill out this quick survey to share your thoughts on Cyber Treats for a chance to win a large three-flavor tin of popcorn from Young’s Popcorn Heaven.

      Want extra entries? Each person you refer to Cyber Treats earns you one additional entry to the popcorn drawing. Forward them this email and have them fill out the Popcorn Drawing form to enter and subscribe to the newsletter.

      Contest ends 9/30/2024. See site for terms and conditions.


      Looking for a custom solution? Schedule a discovery call with Trey to see what your options are for sharing and storage within your organization.

      Cyber Treats: MFA Where?!

      Cyber Treats: MFA Where?!

      GIVEAWAY! We’re asking for your feedback on topics for Cyber Treats and giving away a big popcorn tin from Young’s Popcorn Heaven. Click the link at the bottom to enter!


      We’re all familiar with that pesky little pop-up that appears on log-in screens across the web: “Do you want to enable two-factor authentication on this account?”

      Your answer should always be YES!

      Even if someone gets your passwords, MFA can keep them from stealing your bank information or other online presence.

      MFA (sometimes this is called two-factor authentication, one-time passcode, or a login token) usually involves entering a code sent to your email or phone. Sometimes, online accounts will also take your IP address and location into consideration when it’s time to log in (another “factor”).

      Do you have any of the following? If so, check now to see if you have MFA or 2FA activated.

      Top Sites/Apps to Enable MFA

      – Email Accounts – Business and Personal (this controls access to almost ALL your other accounts)
      – Facebook, Instagram, LinkedIn, or other social media
      – Online Banking and Credit Card Websites
      – Insurance Portals
      – Dropbox or Other Digital Storage Services
      – Online Tax Preparation Websites

      MFA settings are often found in your account information or security settings when you log in and may be labeled “additional security.” If you have any questions, just reply to this email and ask for help.


      TRADE OFFER! ?
      We receive: your feedback about the future of Cyber Treats.
      You receive: a chance to win a popcorn tin from Popcorn Heaven!

      Fill out this quick survey to share your thoughts on Cyber Treats for a chance to win a large three-flavor tin of popcorn from Young’s Popcorn Heaven (trust me, it’s SO good!).

      Want extra entries? Each person you refer to Cyber Treats earns you one additional entry to the popcorn drawing. Forward them this email and have them fill out the Popcorn Drawing form to enter and subscribe to the newsletter.

      Contest ends 9/30/2024. See site for terms and conditions.


      Want some advice on MFA for business cybersecurity? Our team is here to help with MFA solutions for your Microsoft Exchange, VPNs and more to keep your business’ data safe. Call us at (309) 689-3900 or schedule a discovery call with Trey to see what your options are for managed services and MFA.

      How To Audit Cybersecurity Awareness WITHOUT Disrupting Operations

      How To Audit Cybersecurity Awareness WITHOUT Disrupting Operations

      Smart business owners aren’t only investing in cybersecurity products and software packages to keep their data safe: they’re keeping tabs on their teams’ cybersecurity awareness. It’s even smarter to think of this practice as part of your security stack.

      If you’re like most people, when you think of an “audit,” you think of penetration tests, or pen testing, a process that involves a full inventory of your security stack and practices. This can be limited to just your network or include attempts to physically infiltrate your business for the purposes of finding weak points.

      Pen tests are an ideal choice for a full picture of your company’s cybersecurity, but what about in-between? If you want a good idea of where your team stands on security practices, here are some ways to assess your strengths and educate your team on areas for improvement.

      Phishing Simulations

      Phishing simulations are a great way to test your employees’ cyber awareness. Maybe you’ve implemented these either on your own or with the help of an IT provider.

      Often thought of as “gotcha” training devices, these are actually proven to be highly effective in preventing breaches due to human error. It often only takes one alert for an employee to improve practices, read emails more closely, and avoid clicking on suspicious links.

      Some phishing simulations include training materials or videos for your team to watch if they “fail” the test. These videos reinforce important concepts for your team to become more cyber safe, and incentivize employees to watch for phishing emails and complete training.

      Training Opportunities

      Want to do more cybersecurity training with your team, but don’t know where to start? We can help. We have training resources and more that you can use in your company, such as presentations, articles, video links and other resources.

      Do you have daily or weekly meetings with your team? These regular meetings are the perfect opportunity to discuss cyber awareness. We even have quizzes available to gamify your cyber awareness meetings and make it more fun and engaging.

      Forward Those Tech Tips!

      We offer a weekly tech tip email (sign up here!) with insights and quick tips (and a little comic relief). Many of our clients forward the email to their whole team for a quick refresher on security practices.

      Have any questions about employee training or other managed services or cybersecurity concerns? Contact Facet. Our team of helpful, knowledgeable technicians and support staff are happy to answer questions and find a solution that’s the perfect fit for your business. We believe it’s our job to provide you with the tools you need so you can focus on growing your business, not chasing IT issues. Want to learn more? Let’s talk! Contact us here.