Presented by

Logo for Custom Internet Services LLC

Blog

Cybersecurity Awareness Month: Strengthening Your Team's Defense with Essential Cyber Hygiene
Blog

Why Continuous Monitoring is a Cybersecurity Must

Imagine this: you leave your house for vacation. You live in a shady neighborhood but feel confident your locks are secure. But you also don’t check them daily. Are they really locked and safe? A tiny crack or hidden weakness could have occurred. It’s a disaster waiting to happen. 

Read More »
Woman sitting in an office with her head on the desk
Blog

7 Common Pitfalls When Adopting Zero Trust Security

Zero Trust security is rapidly transforming the cybersecurity landscape. It moves away from traditional perimeter-based security models. In this approach, every connection attempt is continuously verified before granting resource access. We’ll explore some common roadblocks and offer guidance on navigating a successful Zero Trust security adoption journey.

Read More »
Be Careful When Scanning QR Codes - There's A New Scam Going Around!
Blog

Be Careful When Scanning QR Codes – There’s a New Scam Going Around!

With the rise in popularity of QR codes comes an unfortunate dark side. Cybercriminals are exploiting this technology for nefarious purposes. Scammers create fake QR codes. They can steal your personal information. They can also infect your device with malware or trick you into paying money.

It’s crucial to exercise caution when scanning QR codes. This emerging scam highlights the potential dangers lurking behind those seemingly innocent squares.

Read More »
Steve Strom, Owner of Custom Internet Services LLC

About the Presenter

Steve is the Owner and CTO for Custom Internet Services. He has over 20 years of experience in Information Technology and taught IT for 13 years at the college level. He holds several IT certifications from Microsoft and CompTIA and has served as a reviewer or technical editor for several Microsoft certification course books. His cybersecurity experience includes holding several Global Information Assurance Certifications (GSEC, GCIA, GCIH, GCFA, GWEB, GICSP) as well as the NSTISSI 4011 sponsored by the Committee on National Security Systems.

Register for Our Next Webinar!

13 November 2025
10:30 AM - 11:00 AM
Virtual,

Your firewall might seem like a fortress, but even the strongest defenses can be breached. That’s where vulnerability and penetration testing comes in. In this webinar, we’ll explore how security pen […]

Free