Webinar Series

Presented by Custom Internet Services LLC

Logo for Custom Internet Services LLC

Blog

a women pointing to a checklist
Blog

What to Include in a Year-end Technology Infrastructure Review

When the year is coming to a close, it’s the perfect time to plan for the future. Most businesses begin the year with the hope of growing and improving operations. Much of how a business operates depends on technology. So, it makes sense to look to your IT for areas of optimization. This year-end, take some time to do a technology review with your IT team or managed IT provider. This will set you up for success and security in the coming year.

Read More »
a lock in a blue circle
Blog

What Are the Advantages of Implementing Conditional Access?

It seems that nearly as long as passwords have been around, they’ve been a major source of security concern. Eighty-one percent of security incidents happen due to stolen or weak passwords. Additionally, employees continue to neglect the basics of good cyber hygiene. Below, we’ll explain what conditional access is. As well as how it works with multi-factor authentication (MFA). We’ll also review the advantages of moving to a conditional access process.

Read More »
a lock with chains on it
Blog

Simple Guide to Follow for Better Endpoint Protection

Endpoints make up much of a company’s network and IT infrastructure. This is a collection of computers, mobile devices, servers, and smart gadgets. As well as other IoT devices that all connect to the company network. In this guide, we’ll provide you with straightforward solutions. Solutions focused on protection of endpoint devices.

Read More »
A Lock Sitting on a labtop
Blog

Insider Threats Are Getting More Dangerous! Here’s How to Stop Them

One of the most difficult types of attacks to detect are those performed by insiders. An “insider” would be anyone that has legitimate access to your company network and data. This would be via a login or other authorized connection. It’s important for companies to understand what makes up an insider threat. That’s the first step towards mitigation.

Read More »
Someone Holding a credit card and typing on a keyboard
Blog

9 Urgent Security Tips for Online Holiday Shopping

The holiday shopping season is taking off. This means that scammers have also revved up their engines. They’re primed and ready to take advantage of all those online transactions. Here are some of the most critical safety tips to improve your online holiday shopping.

Read More »
A robber pointing a flash light at an open letter with a skull on it
Blog

Business Email Compromise Jumped 81% Last Year! Learn How to Fight It

In recent years, electronic mail (email for short) has become an essential part of our daily lives. Many people use it for various purposes, including business transactions. With the increasing dependence on digital technology, cybercrime has grown. A significant cyber threat facing businesses today is Business Email Compromise (BEC).

Read More »
Steve Strom, Owner of Custom Internet Services LLC

About the Presenter

Steve is the Owner and CTO for Custom Internet Services. He has over 20 years of experience in Information Technology and taught IT for 13 years at the college level. He holds several IT certifications from Microsoft and CompTIA and has served as a reviewer or technical editor for several Microsoft certification course books. His cybersecurity experience includes holding several Global Information Assurance Certifications (GSEC, GCIA, GCIH, GCFA, GWEB, GICSP) as well as the NSTISSI 4011 sponsored by the Committee on National Security Systems.

Register for Our Next Webinar!

Backup Planning

October 10, 10:30 AM


If there’s one thing certain in life, it’s that things will fail. Take your business computer system for example – did you realize that the data on that computer and time invested in creating and maintaining that data is worth far more than the computer itself? At the heart of protecting that data is a robust backup and recovery strategy. In this session, we’ll introduce the current 3-2-1 backup best practice, discuss immutability with regards to backups, and learn what needs to be protected.