Facet Technologies Logo

(309) 689-3900

Call our office!

3024 W. Lake Ave., Suite 1

Peoria, IL 61615

8:00AM - 5:00PM

Monday – Friday

Cyber Treats: Texting Troubles

The FBI’s Warning Against Texting – Here’s What to Do.

What the FBI’s advice on encrypted messaging means for your business.

Back in October, there was a large-scale cyber attack on Verizon, AT&T, and Lumen. The NSA has since said that this was an attack supported by China with the goal of accessing phone call and text information from high-ranking US government officials.

As the hack remains unresolved, the FBI recently issued guidelines warning against texting and urged the public to switch to encrypted messaging instead.

What’s Affected?

While iPhones and Androids have their own secure messaging apps, (Google Messages on Android and iMessage on iPhone), these are only secure when messaging others who use the same messaging service, i.e.: Android to Android and iPhone to iPhone. Texting between Androids and iPhones is not secure.

The hack is ongoing, so business leaders should take precautions to secure their internal communications.

A More Secure Option

For personal use, the FBI recommends using an app like Signal to protect your conversations.

If your team uses texting to communicate internally, consider switching to Microsoft Teams. Microsoft Teams offers encrypted messaging (and many other features) and works across your mobile devices and workstations.

While email is not affected by this hack, it’s also a good time to review your email security and filtering. Our team can set up secure messaging through Teams and advanced email security to help protect your business against data breaches.

Want faster collaboration and more efficient work? Let’s get Teams set up for your business.
We decode tech-speak for business leaders and can help you increase uptime with the right toolsSchedule a call by clicking here.

Enter the Cyber Treats Santa’s Helper $100 Giveaway!

We’re giving away a $100 Visa gift card to a Cyber Treats subscriber!

Fill out our form to enter. Get an additional entry for each person you refer to Cyber Treats. Simply have them fill out the entry form and mention your name as their referrer.

For all the rules, visit https://facettech.com/cyber-treats-santas-helper-drawing/.


Sign Up for a Chance to Win

    Cyber Treats: “We’ll Get to It Later?”

    Paying a premium? Make sure you qualify for the payout.

    Cyber liability and data breach insurance policies can protect your business in a cyber attack, but only if you have the required protections in place.

    Picture this: A mid-sized manufacturing company felt their cyber insurance requirements were mostly “paperwork.” They had basic security in place but skipped implementing the EDR solution their insurer strongly recommended. Fast forward three months, and they’re dealing with a ransomware incident that their insurance won’t fully cover because their security didn’t meet the baseline requirements.

    It’s more than box-checking…

    • Requirements are based on real attack patterns insurers are seeing right now (and trust me, cyber insurance payouts only keep rising, so the goal is to prevent expensive attacks)
    • Each requirement typically protects against multiple threats  – like a 2-for-1 deal on your security controls
    • Insurers spend millions gathering threat intelligence, so the recommendations are generally sound
    • It’s not uncommon to detect and stop an attack in progress while implementing insurers’ requirements, like upgrading from antivirus to endpoint protection!

    Pro tip: Don’t wait for your renewal to check your compliance. Make sure you have the necessary protections in place to qualify for payouts if you experience a breach.

    Do you pay for cyber liability or data breach insurance, but aren’t sure if you’re meeting requirements?
    We decode tech-speak for business leaders and can help strengthen your defenses to avoid that claim in the first placeSchedule a call by clicking here.

    Cyber Treats Bonus Links

    A good reminder when you’re Googling to find holiday gifts (from Wired): Malicious Ads in Search Results are Driving New Generations of Scams
    Side Note: this is also a decent argument for including your company name as a keyword if you do any pay-per-click advertising. Not only does it prevent competitors from occupying that top spot, but also prevents malvertising under your name.

    The same group behind the MGM hack also orchestrated a phishing scheme that cost businesses millions (from ArsTechnica): 5 charged in “Scattered Spider,” one of the most profitable phishing scams ever
    What may be most interesting to business leaders here is the attack vector: text messages that claimed to be from internal IT departments, instructing victims to click on a link to avoid account deactivation. Phishing schemes often cultivate a sense of urgency to lower victims’ defenses.

    Thanks for reading Cyber Treats. See you next week!

    How Private is That VPN?

    And should your business use a VPN?

    The Truth About Some Popular VPN Apps

    “Thanks so much to (insert VPN provider here) for sponsoring this video.” Sound familiar?

    VPNs bill themselves as a safeguard against getting your identity stolen on the internet, but many popular VPN providers promise total security, then sell or even steal your data.

    What’s a VPN?

    Personal VPN products connect your device to another network, “bypassing” your ISP (internet service provider) and encrypting your traffic. With a VPN, potential attackers on the same network (say, on public WiFi at a hotel or coffee shop) can’t steal passwords, credit cards, or other data. There’s also off-label usage: some people use VPNs to hide illegal activities, or bypass content blocks in their country.

    Here’s The Issue With Personal VPNs:

    Many VPN apps either ask for or are implicitly given permission to log or sell your data, and that can go to anyone at their discretion. Businesses targeting ads toward you, online services, even, ironically, your ISP. If it’s free, they’re almost certainly staying in business by selling your data (hardly any worthwhile security product is free). Bad actors may also set up “free VPN” services just to steal data.

    There are tradeoffs when searching for a personal VPN provider, so do thorough research if you choose to use one. If you would like more guidance, just reply to this email and we can send some resources to you.

    Now, About Your Business Data…

    If you’re using a personal VPN solution for work, or no VPN, it’s time to explore alternatives. Ideally, your work-from-home setup should connect employees to your company network and firewall, where corporate traffic is filtered and protected by your security stack.

    This safer option removes third party VPNs altogether, and protects your employees, even on public or mobile networks (remember, you never know who has their home WiFi wide open for the rest of the neighborhood).

    Interested in having Facet configure a VPN or cybersecurity plan for your business? Schedule a call with Trey by clicking here.

    Special thanks to Facet team members Zach Jacobson, Karol Burton and Tyler Greenleaf for their technical advice on today’s newsletter topic!

    ? Cyber Treats will be off next week for Thanksgiving so the dogs can beg for turkey and root for the Packers. We will return on December 5. As always, we are grateful for our clients and community. Thanks for being part of the Facet Family.

    Zero Trust: What Business Leaders Should Know

    Think of traditional security like a castle with strong outer walls, moats, sentries, maybe a dragon – you get the idea. In this castle, once someone’s inside, they can move around freely.

    But what if the castle’s not made of stone and sectioned neatly off on its own (I think we’ve taken the metaphor far enough here)? Your employees likely work from home occasionally. They access data on personal devices, maybe even on public networks.

    As the perimeter of your castle expands, zero trust architecture offers a way to secure “anytime, anywhere” access to data, documents and more.

    Why Look Into Zero Trust?

    • Protects against insider threats and compromised accounts (because many threats come through “disguised” as internal staff)
    • Limits damage from breaches – granular control over sensitive resources means attackers can’t freely move through your network
    • Supports remote work by securing access from anywhere
    • Allows your organization to meet tough compliance standards and can lower cyber liability insurance premiums

    Start Today With These Quick Tips

    If you don’t have the resources to implement a “full” zero trust security architecture, you can start by implementing a few key elements of the philosophy into your existing cybersecurity plan.

    • Zero Trust philosophies can be applied everywhere, at work and in your personal digital life.
    • Use multi-factor authentication everywhere, not just for “important” accounts
    • Treat your home and work networks as untrusted – secure each device individually
    • Regularly verify app permissions on your devices (and be picky about which apps you download)
    • Never save passwords in browsers or reuse them across accounts (I cannot stress this enough–once hackers have one email/password combination, they will try it on many sites across the web)

    Let’s Talk Zero Trust for Your Business: Meeting Compliance Standards and More

    Many industries are faced with new compliance standards. Facet, as your managed services partner, can work with you to implement a cybersecurity plan informed by zero trust principles to meet or exceed these standards so you can grow your business.

    Designed properly, zero trust architecture doesn’t have to slow down your employees or affect performance. In fact, it can help you become more profitable as you can prove to potential clients that you take their data seriously.

    Want to learn more?

    Fill out the form below and mention zero trust in the message box. Our team will reach out with more information on securing your organization from threats inside and out.

      Cyber Treats: Online Shopping and Mobile Device Management

      3 Tips for Safer Online Shopping

      According to the FTC, shopping scams were the second-most reported in the US in 2023–and they’re at their worst during the holidays. According to TransUnion’s 2022 Global Digital Fraud Trends report, there was a 127% increase in daily fraud attempts between November 24 and 28 compared to January 1 through November 23.

      Volume of orders isn’t the only factor here. According to Norton’s 2022 Cyber Safety Insights Report, nearly one in three adults (32%) worldwide admitted to taking more risks with online shopping closer to the holidays, so if you find yourself clicking “add to cart” a bit quicker than usual, you’re not alone.

      Below, we detail three common scams and how to avoid them for safer shopping this year.

      The “Undeliverable Package” Text (or Email)

      A text comes through alerting you that a package is not deliverable to your house or business. It’s the holidays. You’ve ordered at least 15 gifts in a coffee-fueled shopping push this weekend, so it seems plausible. You click the link. You get malware on your phone.

      Avoid this by tracking orders directly through a retailer’s website or app. Avoid clicking links in suspicious messages (especially if they don’t mention a company name), and be cautious of unsolicited delivery messages.

      The Gift Card “Deal”

      You come across an amazing deal for gift cards at a steep discount. You purchase the cards as gifts. Once you’ve purchased the cards, the scammer uses the card, leaving you out fifty big ones with a worthless card. Alternatively, scammers will request payment for items via gift cards so they can continue these schemes.

      Avoid this by purchasing gift cards directly from reputable retailers. Never use gift cards as a form of payment to unknown individuals.

      The “Extreme Couponer”

      You find an amazing coupon link promising steep discounts via e-mail, social media, or SEO-optimized pages on a Google search. What’s the scam? These coupon links can lead to phony websites made to mimic a legit retailer, or even sites that encourage you to download adware or malware.

      Avoid this by looking for coupons with the retailer’s official site and/or app, or sign up for their email list. Also, install a good ad blocker.

      Consider Mobile Device Management

      Does your team use mobile devices for work? Perhaps the ones on which they also do their Cyber Monday shopping? If so, your business’s documents are right there with anything and everything on their phone—if their phone gets hacked, your company data can be left vulnerable.

      The solution? Education and mobile device management. With an MDM solution, you get seamless security for iOS, Android, iPadOS and frontline worker devices. This native endpoint security detects SMS/email phishing, app management, identity management and more.

      MDM along with good cyber awareness training can help build a strong security posture. Facet offers an MDM as part of our Advanced Security Suite of products that can be added on to any managed service agreement.

      Want to learn more about MDM and see if it’s a good fit for your team? Schedule a call with Trey by clicking here.

      Cyber Treats: Ready for a Quiz?

      CONGRATULATIONS to the winner of the October Popcorn Giveaway, Jenni of JM Industrial Supply! Watch for our next drawing in November–you could be our next winner!

      Ready to put that cybersecurity knowledge to the test?

      We’ve put together a Halloween-themed cybersecurity trivia quiz for you! Test your own knowledge or share with your team for some spooky fun!

      Watch the video version on YouTube here.

      Or use this link for a presentable version on Canva (great for groups trivia).

      In The News: Healthcare Hacks

      The healthcare industry continues to be a top target for hackers. UnitedHealth just released more information on their February incident: it affected over 100 million customers and they are still notifying affected parties. In September, an entire ER in Texas was shut down due to attack. This week, a hospice pharmacy company in Arizona experienced a breach.

      Healthcare data remains a valuable commodity on the black market–with health records regularly fetching more than 10 times the amount of credit card information.

      For organizations in the healthcare space, the message is clear: it pays to keep your systems secure as hacking groups see health systems as lucrative targets.

      Need some cybersecurity advice for the healthcare industry, or any industry? We’re expert problem solvers for IT and cybersecurity. Schedule a discovery call with Trey by clicking here.

      Cyber Treats: Cybersecurity, IRL

      More than software stacks and complex passwords.

      Some cybersecurity vulnerabilities are surprisingly simple—and visible. These tips go beyond the virtual. Let’s go irl!

      A goofy desktop background is the best-case scenario here…

      Before you step away from your desk, take two seconds to lock your computer (Windows key + L on PC, Control + Command + Q on Mac), especially if you’re working in a public place. Why? In those few minutes you’re gone, anyone could:

      – Send emails as you

      – Access sensitive company files

      – View confidential client information

      – Install harmful software

      Make it a habit to “lock it up” every time you leave your PC.

      When the server room is also your waiting room…

      Did you know that penetration tests often include a physical access component? Pen testers will mimic the tactics real hackers use to attempt to access servers and other equipment, posing as your IT provider, internet provider, or just walking right in your office.

      To prevent physical access to your data, some security measures to consider include:

      – A clear visitor policy (who can enter, when, and why?)

      – Sign-in procedures for guests

      – Employee ID badges or key cards

      – After-hours access protocols

      – Regular audits of who has keys or access codes

      Note: if someone who says they’re a technician from Facet shows up unexpectedly, you can always give us a call to make sure they’re legit.

      Quick Action: Walk your office today. Are visitors wandering freely? Are computers left unlocked? Who has office keys?

      Start with these basics, and you’ve already closed two major vulnerability gaps.


      Just Something Fun (and Maybe Frustrating?)

      Challenge your friends or family to neal.fun’s Password Game.


      ? TRADE OFFER! ?
      We receive: your feedback about the future of Cyber Treats.
      You receive: a chance to win a popcorn tin from Popcorn Heaven!

      We’re doing another Cyber Treats popcorn giveaway for October! We appreciate our subscribers and want to make sure Cyber Treats is sharing information relevant to YOU!

      Fill out this quick survey to share your thoughts on Cyber Treats for a chance to win a large tin of popcorn from Young’s Popcorn Heaven (it’s SO good).

      Want extra entries? Each person you refer to Cyber Treats earns you one additional entry to the popcorn drawing. Forward them this email and have them fill out the Popcorn Drawing form to enter and subscribe to the newsletter.

      Contest ends 10/31/2024. See site for terms and conditions.


      Want some advice on business cybersecurity? Our team is here to help with solutions to keep your business’ data safe. Call us at (309) 689-3900 or schedule a discovery call with Trey to see what your options are for managed services and cybersecurity.

      Cyber Treats: QR Codes and How to Scan for Scams

      QR codes are convenient, but cybercriminals use them for scams, too—usually to get you to download malware or reveal sensitive information. Protect yourself from QR phishing scams with these quick tips:

      1. Inspect the source: Only scan codes from trusted entities.

      2. Check the URL: If you use your phone’s camera to scan QR codes, the link should pop up in the middle of your screen. Before clicking, ensure the link looks legitimate.

      3. Use the right app: If your camera app doesn’t allow you to preview links, install a QR scanner app like Binary Eye.

      4. Be wary of unsolicited codes: Don’t scan random QR codes in public or emails. There have been cases of scammers putting outrageous posters up on the street to try and steal information through QR code scans.

      5. Keep devices updated: This helps defend against newly discovered vulnerabilities.

      Remember: When in doubt, don’t scan, especially if you can’t verify the source of the QR code.

      Did You Know? Targeted Ads, Data Privacy and Your Teen

      When children turn 13, they age out of the Children’s Online Privacy Protection Act (COPPA). This means that companies can assign your teen an advertising ID that tracks them across the web using their phone, Google account, and more, and sell their information to data brokers. Scary? Yes!

      The EFF (Electronic Frontier Foundation) has a guide on how to remove these IDs from your kids’ devices here. It’s worthwhile to check, even on devices for kids under 13, and on school-issued devices, to decrease their security risks on the web.

      Want some advice on business cybersecurity? Our team is here to help with solutions to keep your business’ data safe. Call us at (309) 689-3900 or schedule a discovery call with Trey to see what your options are for managed services and cybersecurity.

      Cyber Treats: Afraid of the Dark (Web)?

      Welcome to our new subscribers who we met at this week’s ILA conference!

      What exactly is the dark web?

      The internet is comprised of layers. The surface web, or what we most likely think of when we imagine “the internet,” is only the tip of the iceberg. Beyond that, lies what is called the “deep web,” and beyond that, the “dark web.”

      Surface Web:

      • Publicly accessible websites indexed by search engines
      • Examples: news sites, social media, online shops

      Deep Web:

      • Content not indexed by standard search engines
      • Requires specific access or credentials
      • Much larger than the surface web
      • Examples: academic databases, medical records, private social media content

      Dark Web:

      • A small portion of the deep web that requires a special browser like Tor to access
      • Intentionally hidden and anonymous
      • Contains both legitimate and illegal activities
      • Examples: whistleblowing platforms, illegal marketplaces

      The Dark Web and You

      Even if you don’t access the dark web, you can feel its affects. Most modern identity theft happens through dark web marketplaces, and it’s likely that you have passwords and logins in “combolists” for sale by hackers.

      What’s there to do about it?

      It’s nearly impossible to avoid EVERY website data breach, but take steps to mitigate the damage.

      Check periodically for dark web password breaches. We offer free dark web reports with information about compromised accounts—just reach out here and we will send you a custom report.

      Use different passwords for each website. List buyers will run credentials through most common websites to check for repeat passwords—and exploit what they find there.

      In the News: Internet Archive Hacked

      Yesterday, the Internet Archive/The Wayback Machine, which stores screen captures of sites through the years, was hacked. Side note: normally, I read about hacks in the news. This time, I found out when I tried to find an old restaurant review referenced in an episode of Kitchen Nightmares. The hacker posted a JavaScript message to visitors reading, “Have you ever felt like the Internet Archive runs on sticks and is constantly on the verge of suffering a catastrophic security breach? It just happened. See 31 million of you on HIBP!” (Have I Been Pwned is free data breach notification service).

      The stolen passwords are encrypted, but can be referenced against previous uses of the same password. If you’re reusing passwords, time to switch it up. At this time, the hackers still have control of the site.

      Cyber Treats Weekly: The Truth About Vendor Cybersecurity



      The Solution? Start Asking the Hard Questions.

      In the News: Background Check Data Exposed (Again)

      Congratulations to Our Giveaway Winner!


      Feedback?