Presented by

Logo for Custom Internet Services LLC

The topic of cybersecurity can seem more than a little overwhelming, and you’re probably wondering where to begin. The good news is that we’re here to help you as you begin this journey of securing your network and devices.

Understanding the Need for Cybersecurity

The articles and webinars on this site are designed to give you an appreciation for various aspects of cybersecurity and the challenges that all network and device owners face in trying to build a secure environment.

First Steps

After you've gained an appreciation for the scope of the cybersecurity problem, the next step is to begin with the "low hanging fruit". These items are often relatively simple to remediate and give a large return for your investment in time and resources. Beginning with these items will pay big dividends as you begin your cybersecurity journey.

What's Next

Now that the initial steps are completed, it's time to consider further enhancing your cybersecurity stand. The human element is often the weakest link in securing any environment so it's important to educate yourself as well those you work with. Use these resources to help you lay out a roadmap for future growth and development.

Newest Resources

Black and orange background with text that reads, "Practical Cybersecurity Webinar Series: Season 4"
Announcement

Announcing Season 4

Custom Internet Services is excited to announce Season 4 of our Practical Cybersecurity Webinar Series! These short, 30 minute webinars are provided free of charge to businesses and organizations with questions about improving their cybersecurity stance.

Read More »
Collage of profile pictures with one picture being a dark-red photo of a scammer. Text reads, "Friends, Followers, and Frauds: The Unfriendly Side of Social Media"
Webinar

Friends, Followers, and Frauds

In a world driven by ‘Likes’, how can we manage the security issues of social media? We’ll look at some of the security problems introduced by social media, how these factors are leveraged by bad actors, and some ways you can protect yourself.

Read More »
Man standing with a digital outline of the man standing in front of him. Text reads, "Your Digital Doppelganger: Lots of Hackers Would Love To Be You"
Webinar

Your Digital Doppelganger

“I’m just a small business – what could I have that is important to hackers?” You’ve probably heard this sentiment and may have used it to wonder why you should spend money for better network security. We’ll talk about what you have that’s valuable, what hackers can gain from your network, and some initial steps to keep your network for you.

Read More »
Steve Strom, Owner of Custom Internet Services LLC

About the Presenter

Steve is the Owner and CTO for Custom Internet Services. He has over 20 years of experience in Information Technology and taught IT for 13 years at the college level. He holds several IT certifications from Microsoft and CompTIA and has served as a reviewer or technical editor for several Microsoft certification course books. His cybersecurity experience includes holding several Global Information Assurance Certifications (GSEC, GCIA, GCIH, GCFA, GWEB, GICSP) as well as the NSTISSI 4011 sponsored by the Committee on National Security Systems.

Register for Our Next Webinar!

13 November 2025
10:30 AM - 11:00 AM
Virtual,

Your firewall might seem like a fortress, but even the strongest defenses can be breached. That’s where vulnerability and penetration testing comes in. In this webinar, we’ll explore how security pen […]

Free