Webinar Series

Presented by Custom Internet Services LLC

Logo for Custom Internet Services LLC

New Cybersecurity Webinar Series!

Man sitting in front of computer, taking notes in a notebook

Custom Internet Services is excited to announce our Practical Cybersecurity Webinar Series! These short, 30 minute webinars are provided free of charge to businesses and orgnaizations with questions about improving their cybersecurity stance. Each monthly session covers a different topic and offers practical cybersecurity tips that you can put to use.

Sessions will be presented by Steve Strom and various team members of Custom Internet Services.

Newest Resources

Webinar

What Does Cyber Insurance Expect of Me?

Cyber insurance almost seems like this black hole that is mysterious to understand. Yet if we’re victims of a cyber incident – something like ransomware, social engineering, business email compromise, etc – we’re going to want that insurance to pay off. So what can we do to enhance the likelihood that cyber insurance will pay when needed? What does my cyber insurance policy expect of me? That’s what we’re going to explore in this fast paced session.

Read More »
Steve Strom, Owner of Custom Internet Services LLC

About the Presenter

Steve is the Owner and CTO for Custom Internet Services. He has over 20 years of experience in Information Technology and taught IT for 13 years at the college level. He holds several IT certifications from Microsoft and CompTIA and has served as a reviewer or technical editor for several Microsoft certification course books. His cybersecurity experience includes holding several Global Information Assurance Certifications (GSEC, GCIA, GCIH, GCFA, GWEB, GICSP) as well as the NSTISSI 4011 sponsored by the Committee on National Security Systems.

Register for Our Next Webinar!

Backup Planning

October 10, 10:30 AM


If there’s one thing certain in life, it’s that things will fail. Take your business computer system for example – did you realize that the data on that computer and time invested in creating and maintaining that data is worth far more than the computer itself? At the heart of protecting that data is a robust backup and recovery strategy. In this session, we’ll introduce the current 3-2-1 backup best practice, discuss immutability with regards to backups, and learn what needs to be protected.