Presented by

Logo for Custom Internet Services LLC

Blog

"Insider Threats Are Getting More Dangerous! Here's How to Stop Them"
Blog

Insider Threats Are Getting More Dangerous! Here’s How to Stop Them

One of the most difficult types of attacks to detect are those performed by insiders. An “insider” would be anyone that has legitimate access to your company network and data. This would be via a login or other authorized connection. It’s important for companies to understand what makes up an insider threat. That’s the first step towards mitigation.

Read More »
Someone Holding a credit card and typing on a keyboard
Blog

9 Urgent Security Tips for Online Holiday Shopping

The holiday shopping season is taking off. This means that scammers have also revved up their engines. They’re primed and ready to take advantage of all those online transactions. Here are some of the most critical safety tips to improve your online holiday shopping.

Read More »
A robber pointing a flash light at an open letter with a skull on it
Blog

Business Email Compromise Jumped 81% Last Year! Learn How to Fight It

In recent years, electronic mail (email for short) has become an essential part of our daily lives. Many people use it for various purposes, including business transactions. With the increasing dependence on digital technology, cybercrime has grown. A significant cyber threat facing businesses today is Business Email Compromise (BEC).

Read More »
5 Things You Should Never Do On A Work Computer
Blog

5 Things You Should Never Do on a Work Computer

In a survey of over 900 employees, it was found that only 30% said they never used their work PC for personal activities. The other 70% admitted to using their work computer for various personal reasons. 

Some of the non-work-related things that people do on a work computer include:

Read More »
A phone with a recycle sign on it
Blog

Important Steps to Take Before You Recycle a Mobile Phone Number

It’s not unusual to change a mobile number from time to time. For example, when you move, you may want a number that is local to the area you just moved to. Companies also may end up recycling mobile numbers throughout their staff as people come and go. Because our mobile numbers are connected to much of our online and offline life, it’s important to take certain steps to ensure that you don’t leave yourself at risk when recycling your phone number.

Read More »
Burglar Walking out of phone with your data
Blog

Alarming Phishing Attack Trends to Beware of in 2022

In 2020, 75% of companies around the world experienced a phishing attack. Phishing remains one of the biggest dangers to your business’s health and wellbeing because it’s the main delivery method for all types of cyberattacks. Here are some of the latest phishing trends that you need to watch out for in 2022.

Read More »
Steve Strom, Owner of Custom Internet Services LLC

About the Presenter

Steve is the Owner and CTO for Custom Internet Services. He has over 20 years of experience in Information Technology and taught IT for 13 years at the college level. He holds several IT certifications from Microsoft and CompTIA and has served as a reviewer or technical editor for several Microsoft certification course books. His cybersecurity experience includes holding several Global Information Assurance Certifications (GSEC, GCIA, GCIH, GCFA, GWEB, GICSP) as well as the NSTISSI 4011 sponsored by the Committee on National Security Systems.

Register for Our Next Webinar!

10 April 2025
10:30 AM - 11:00 AM
Virtual,

The proliferation of easy-to-use cloud tools means it's easier than ever for your business data to end up in locations you never intended, or even to be lost forever. How do you control this sprawl when employees just want ease of use? And more importantly, how do you make sure your data doesn't get lost in this cloud universe?

Free