Presented by

Logo for Custom Internet Services LLC

Blog

a red Alexa
Blog

Are Your Smart Home Devices Spying On You (Experts Say, Yes)

The integration of smart home devices has become synonymous with modern living. They offer convenience, efficiency, and connectivity at our fingertips. It’s natural these days to invite these devices into your home. Yet there is also the need to scrutinize their privacy implications. We’ll shed some light on the potential surveillance risks posed by smart home devices as well as discuss ways to safeguard your privacy in an era of increasing connectivity. 

Read More »
Need to Show the Tangible Value of Cybersecurity? Here's How
Blog

Need to Show the Tangible Value of Cybersecurity? Here’s How

Conveying the tangible value of cybersecurity initiatives to decision-makers can be challenging. The need for protection is clear, but executives want hard data to back up spending.

We’ll explore strategies to effectively show the concrete benefits of cybersecurity measures. These can help you make the case for stronger measures at your company. As well as help you understand how your investments return value.

Read More »
a guy looking at his computer that has lots of code on it
Blog

Top Data Breaches of 2023: Numbers Hit an All-Time High

The battle against cyber threats is an ongoing challenge. Unfortunately, 2023 has proven to be a watershed year for data breaches. Data compromises have surged to an all-time high in the U.S. This is based on data from the first 9 months of the year. Meaning that numbers will only end up higher for the year. 

Read More »
How Could Your Business Be Impacted By The New SEC Cybersecurity Requirements?
Blog

How Could Your Business Be Impacted by the New SEC Cybersecurity Requirements?

The SEC’s new cybersecurity rules emphasize the importance of proactive cybersecurity measures. These are for businesses operating in the digital landscape. One of the central requirements is the timely reporting of cybersecurity incidents. The other is the disclosure of comprehensive cybersecurity programs.

The rules impact U.S. registered companies. As well as foreign private issuers registered with the SEC.

Read More »
a computer with a warning sign on it
Blog

Beware of These 2024 Emerging Technology Threats

The global cost of a data breach last year was USD $4.45 million. This is an increase of 15% over three years. As we step into 2024, it’s crucial to be aware of emerging technology threats. Ones that could potentially disrupt and harm your business. 

Read More »
Steve Strom, Owner of Custom Internet Services LLC

About the Presenter

Steve is the Owner and CTO for Custom Internet Services. He has over 20 years of experience in Information Technology and taught IT for 13 years at the college level. He holds several IT certifications from Microsoft and CompTIA and has served as a reviewer or technical editor for several Microsoft certification course books. His cybersecurity experience includes holding several Global Information Assurance Certifications (GSEC, GCIA, GCIH, GCFA, GWEB, GICSP) as well as the NSTISSI 4011 sponsored by the Committee on National Security Systems.

Register for Our Next Webinar!

13 February 2025
10:30 AM - 11:00 AM
Virtual,

You've just purchased some version of Microsoft 365. But it comes with so many things! What do we do with all these apps? That's what we'll look at in this webinar. We'll focus on Microsoft 365 Business Premium and give a quick overview of all the nifty tools now ready for your use.

Free