More than software stacks and complex passwords. Some cybersecurity vulnerabilities are surprisingly simple—and visible. These tips go beyond the virtual. Let’s go irl! A goofy desktop background is the best-case scenario here… Before you step away from your desk,...
Tag: newsletter feature
Cyber Treats: QR Codes and How to Scan for Scams
QR codes are convenient, but cybercriminals use them for scams, too—usually to get you to download malware or reveal sensitive information. Protect yourself from QR phishing scams with these quick tips: Inspect the source: Only scan codes from trusted entities. Check...
5 Phishing “Cues” Cybersecurity Experts Always Notice
Welcome to the new Cyber Treats Weekly. We'll be sharing valuable tech tips, cybersecurity practices, and current information that you can share with your team (featuring Maggie and Boomer, cartoon versions of Facet's "shop dogs.") Now, onto the tips! It pays to...
Tech Tip: How to Disable “Off-Facebook Activity”
Facebook tracks its users’ activity across the web. Here’s how to stop it. Among security experts, there’s a …
Let’s Talk Network Documentation!
IT documentation is a powerful force when it comes to your business network and overall operations. Done well, …
FBI IC3 Report: Cybercrime Losses Up 48% in 2021
Did You Know? The dark web could now be considered the world’s third largest economy, with experts estimating that cybercrime brought in over $6 trillion in 2021, according to the FBI’s annual Internet Crime Report, which documents cybercrime trends. The Bureau...
Tech Tip: This 2-Second Habit Can Help Keep You Safe!
It may sound simple, but pressing the Windows Key+L when you step away from your computer can save …
Your Business Needs a Firewall for Life. Here’s Why.
Facet installs and maintains firewalls as part of their managed security solution. Find out why we recommend a HaaS approach to firewalls. A firewall is the first line of defense against intrusion in your network. Firewalls are a crucial component of your layered...
Facet Follies – March 2021
Facet Follies March 2021 Facet Follies is a monthly tech cartoon by Mike Wright. Want more Follies in your inbox? Sign up for our newsletter below.
Tech Tip: Cleaning and Sanitizing Your Computer
TECH TIP: Sanitizing Your Computers & Equipment This month’s tech tip is from IT Bench Technician Vincent Bethel. Vince shares how to clean your computer equipment to help keep you and others safe, especially on shared equipment. We often talk about how to keep...
Search
Recent Posts
Can a Managed IT Provider Replace Your In-House IT Person?
A managed IT provider can replace, augment, or complement an in-house IT employee. Whether replacement is the right move depends on the size of your business, the workload your IT person carries, and what you actually need from technology going forward. For most...
What Should Manufacturers in Central Illinois Look for in an IT Partner?
Manufacturing IT is its own discipline. The combination of production networks, operational technology, supply chain connectivity, and intellectual property protection creates an environment that general-purpose IT providers are not built to support. For manufacturers...
What Should Healthcare Organizations in Central Illinois Look for in an IT Partner?
Healthcare IT is not the same as general business IT. Medical practices, clinics, dental offices, behavioral health groups, and specialty care facilities in Central Illinois face a specific set of demands that most IT providers are not equipped to handle. Between...
Cybersecurity for Agriculture: Why Farms and Processors Are Targets
Why Are Agriculture Businesses a Growing Target for Cyberattacks? Agriculture is now one of the fastest-growing targets for cybercriminals. Ransomware attacks on food and agriculture companies more than doubled in early 2025, with 84 incidents reported in the first...
How Are Central Illinois Businesses Meeting Cyber Insurance Requirements in 2026?
Cyber insurance carriers now require documented proof of specific security controls before they will issue or renew a policy. For Central Illinois businesses, meeting these requirements means having multi-factor authentication, endpoint detection and response, tested...
