GIVEAWAY! We're asking for your feedback on topics for Cyber Treats and giving away a big popcorn tin from Young's Popcorn Heaven. Click the link at the bottom to enter! Personal Cloud Storage: the Cost of Convenience How many employees use unsanctioned...
Tag: cybersecurity
Cyber Treats: MFA Where?!
GIVEAWAY! We're asking for your feedback on topics for Cyber Treats and giving away a big popcorn tin from Young's Popcorn Heaven. Click the link at the bottom to enter! We're all familiar with that pesky little pop-up that appears on...
How To Audit Cybersecurity Awareness WITHOUT Disrupting Operations
Smart business owners aren’t only investing in cybersecurity products and software packages to keep their data safe: they’re keeping tabs on their teams’ cybersecurity awareness. It’s even smarter to think of this practice as part of your security stack. If you’re...
5 Phishing “Cues” Cybersecurity Experts Always Notice
Welcome to the new Cyber Treats Weekly. We'll be sharing valuable tech tips, cybersecurity practices, and current information that you can share with your team (featuring Maggie and Boomer, cartoon versions of Facet's "shop dogs.") Now, onto the tips! It pays to...
Here’s How to Get Ready to Seek a Cyber Liability Insurance Policy
More Companies Will Be Denied for Cyber Liability Insurance in 2022 than Ever Before—Here’s How to Prepare Cyber liability insurance (also known as cybersecurity insurance or cyber insurance) is soaring in popularity. Why? Businesses are being hit by ransomware and...
Blackmail Phishing Scams: 4 Steps to Take if You Receive an Extortion Email
Fear, Lies, and Greed: Blackmail Phishing Scams Play on Embarrassment for Huge Payouts Why am I getting this email? I didn’t do anything wrong! A friend of mine recently sent me a screenshot of an email via text. The subject line was a random string of characters,...
Ransomware on the Rise: Five Steps to Improved Email Security
How far would you go to protect your company’s data? How about your customers’ data? Every day, business owners are confronted with this exact question when they become victims of ransomware schemes. According to an industry report by Coveware, the average ransomware...
Search
Recent Posts
Managed vs. Co-Managed IT: Which Model Fits Your Business in Peoria?
Managed IT means an outside provider handles all of your technology — helpdesk, security, monitoring, planning, and vendor management. Co-managed IT means that provider works alongside your existing internal IT person or team, filling gaps in coverage, expertise, or...
Switching IT Providers in Peoria: What to Expect When You Move to Facet
Switching IT providers does not have to be painful — but it does require a plan. In our experience, the vast majority of transitions are completed within 30 days for small and mid-sized businesses across Peoria and Central Illinois. The only time it runs longer is...
CMMC 2.0 Compliance for Manufacturers: What Central Illinois Defense Contractors Need to Know
The Time for Adoption is Now CMMC 2.0 certification is now required for manufacturers bidding on Department of Defense contracts in 2026. Phase 1 implementation began November 10, 2025, which means self-assessments are already appearing in new solicitations across the...
Why Central Illinois Manufacturers Are Prime Targets for Cyber Attacks in 2026
Central Illinois manufacturers face growing cyber threats because they combine high-value intellectual property, operational technology that's difficult to update, and connections to larger supply chains. Attackers know that production downtime costs manufacturers...
AI-Fluent Leaders: A Practical AI Webinar Series for Business Owners and Executives
AI isn't waiting for you to figure it out. It's already in your business—whether you've approved it or not. Your employees are experimenting with ChatGPT, Microsoft Copilot, and automation tools right now. Some are saving time. Others might be exposing sensitive data...
