Blog

New Gmail Threats Targeting Users in 2025
Cybercriminals target Gmail a lot because it’s very popular. It also integrates with many other Google services.

10 Tips to Get The Most Out of Your Microsoft 365 Apps
Microsoft 365 is a strong set of tools created to make working together and staying safe easier on many devices and systems.

Where Do Deleted Files Go?
It may seem like the file is gone for good when you delete it from your computer.

7 New and Tricky Types of Malware to Watch Out For
Malware is a huge threat in the digital world.

Announcing Season 3!
Custom Internet Services is excited to announce Season 3 of our Practical Cybersecurity Webinar Series! These short, 30 minute webinars are provided free of charge to businesses and organizations with questions about improving their cybersecurity stance.

8 Consideration Before Buying Used Technology
A device that’s slow or broken is inconvenient and can affect productivity for day-to-day tasks.

Top 10 Security Tips For Mobile App Users
According to 2024 data from Asee, over 75% of published apps have at least one security vulnerability.

Spotting the Difference Between Malware and Ransomware
Malware and ransomware are two types of bad software. They can damage your computer or steal your data.

All About The New U.S. Cyber Trust Market
The Cyber Trust Mark is a new smart device label created by the US government to prove that a device is safe.
About the Presenter
Steve is the Owner and CTO for Custom Internet Services. He has over 20 years of experience in Information Technology and taught IT for 13 years at the college level. He holds several IT certifications from Microsoft and CompTIA and has served as a reviewer or technical editor for several Microsoft certification course books. His cybersecurity experience includes holding several Global Information Assurance Certifications (GSEC, GCIA, GCIH, GCFA, GWEB, GICSP) as well as the NSTISSI 4011 sponsored by the Committee on National Security Systems.
Register for Our Next Webinar!
In today’s digital landscape, compliance management is more than just a checkbox—it’s a strategic approach to protecting your organization. Whether you're facing a cyber insurance claim or responding to regulatory […]