GIVEAWAY! We're asking for your feedback on topics for Cyber Treats and giving away a big popcorn tin from Young's Popcorn Heaven. Click the link at the bottom to enter! Personal Cloud Storage: the Cost of Convenience How many employees use unsanctioned...
Tag: cybersecurity
Cyber Treats: MFA Where?!
GIVEAWAY! We're asking for your feedback on topics for Cyber Treats and giving away a big popcorn tin from Young's Popcorn Heaven. Click the link at the bottom to enter! We're all familiar with that pesky little pop-up that appears on...
How To Audit Cybersecurity Awareness WITHOUT Disrupting Operations
Smart business owners aren’t only investing in cybersecurity products and software packages to keep their data safe: they’re keeping tabs on their teams’ cybersecurity awareness. It’s even smarter to think of this practice as part of your security stack. If you’re...
5 Phishing “Cues” Cybersecurity Experts Always Notice
Welcome to the new Cyber Treats Weekly. We'll be sharing valuable tech tips, cybersecurity practices, and current information that you can share with your team (featuring Maggie and Boomer, cartoon versions of Facet's "shop dogs.") Now, onto the tips! It pays to...
Here’s How to Get Ready to Seek a Cyber Liability Insurance Policy
More Companies Will Be Denied for Cyber Liability Insurance in 2022 than Ever Before—Here’s How to Prepare Cyber liability insurance (also known as cybersecurity insurance or cyber insurance) is soaring in popularity. Why? Businesses are being hit by ransomware and...
Blackmail Phishing Scams: 4 Steps to Take if You Receive an Extortion Email
Fear, Lies, and Greed: Blackmail Phishing Scams Play on Embarrassment for Huge Payouts Why am I getting this email? I didn’t do anything wrong! A friend of mine recently sent me a screenshot of an email via text. The subject line was a random string of characters,...
Ransomware on the Rise: Five Steps to Improved Email Security
How far would you go to protect your company’s data? How about your customers’ data? Every day, business owners are confronted with this exact question when they become victims of ransomware schemes. According to an industry report by Coveware, the average ransomware...
Search
Recent Posts
Cyber Treats – Scary Cyber Stories to Tell in the Dark
Enter if You Dare. Ringing the doorbell AND saying "trick or treat," also counts as 2FA, just FYI. This Year's Cybersecurity Nightmares We don't like to get too spooky here at Cyber Treats, but this year had sophisticated attacks, massive breaches, and threats...
Co-Managed IT in Peoria: When Your Internal Team Needs Backup (Not Replacement)
You hired a skilled IT person. They keep the lights on, handle password resets, and manage your daily technology needs. But lately, they're drowning in security alerts, struggling to stay ahead of compliance requirements, and working nights to patch vulnerabilities...
Why Business Continuity Planning Matters
Your server just crashed. Ransomware hit overnight. Hardware failed. How long until your Peoria business is operational again? If you're guessing, you don't have continuity—you have hope. Hope isn't a recovery strategy for Central Illinois businesses. What Business...
Which Compliance Framework Does Your Central Illinois Business Actually Need?
A straight answer to PCI, HIPAA, CMMC, and FEDRAMP requirements for Peoria-area companies You process credit cards. Does that trigger PCI requirements? Your facility handles patient records. Does HIPAA apply? You bid on government contracts. Is CMMC mandatory? These...
5 HIPAA Violations Costing Medical Practices Millions (And How to Stop Them)
Federal regulators collected nearly $145 million in HIPAA fines since enforcement began. In 2024 alone, 22 investigations ended in penalties—one of the busiest years on record. For medical practices across Central Illinois, the question isn't whether you'll be...
