Webinar Series

Presented by Custom Internet Services LLC

Logo for Custom Internet Services LLC

Blog

Hand pointing at a computer
Blog

5 Things You Should Never Do on a Work Computer

In a survey of over 900 employees, it was found that only 30% said they never used their work PC for personal activities. The other 70% admitted to using their work computer for various personal reasons. 

Some of the non-work-related things that people do on a work computer include:

Read More »
A phone with a recycle sign on it
Blog

Important Steps to Take Before You Recycle a Mobile Phone Number

It’s not unusual to change a mobile number from time to time. For example, when you move, you may want a number that is local to the area you just moved to. Companies also may end up recycling mobile numbers throughout their staff as people come and go. Because our mobile numbers are connected to much of our online and offline life, it’s important to take certain steps to ensure that you don’t leave yourself at risk when recycling your phone number.

Read More »
Burglar Walking out of phone with your data
Blog

Alarming Phishing Attack Trends to Beware of in 2022

In 2020, 75% of companies around the world experienced a phishing attack. Phishing remains one of the biggest dangers to your business’s health and wellbeing because it’s the main delivery method for all types of cyberattacks. Here are some of the latest phishing trends that you need to watch out for in 2022.

Read More »
Steve Strom, Owner of Custom Internet Services LLC

About the Presenter

Steve is the Owner and CTO for Custom Internet Services. He has over 20 years of experience in Information Technology and taught IT for 13 years at the college level. He holds several IT certifications from Microsoft and CompTIA and has served as a reviewer or technical editor for several Microsoft certification course books. His cybersecurity experience includes holding several Global Information Assurance Certifications (GSEC, GCIA, GCIH, GCFA, GWEB, GICSP) as well as the NSTISSI 4011 sponsored by the Committee on National Security Systems.

Register for Our Next Webinar!

Backup Planning

October 10, 10:30 AM


If there’s one thing certain in life, it’s that things will fail. Take your business computer system for example – did you realize that the data on that computer and time invested in creating and maintaining that data is worth far more than the computer itself? At the heart of protecting that data is a robust backup and recovery strategy. In this session, we’ll introduce the current 3-2-1 backup best practice, discuss immutability with regards to backups, and learn what needs to be protected.