Presented by

Logo for Custom Internet Services LLC

Blog

Be Careful When Scanning QR Codes - There's A New Scam Going Around!
Blog

Be Careful When Scanning QR Codes – There’s a New Scam Going Around!

With the rise in popularity of QR codes comes an unfortunate dark side. Cybercriminals are exploiting this technology for nefarious purposes. Scammers create fake QR codes. They can steal your personal information. They can also infect your device with malware or trick you into paying money.

It’s crucial to exercise caution when scanning QR codes. This emerging scam highlights the potential dangers lurking behind those seemingly innocent squares.

Read More »
Woman sitting in front of a laptop with her head resting on her hand
Blog

Is My Network Really Under Attack?

Part of what makes the need for cybersecurity so hard to understand is that most of us really can’t “see” cyber attacks taking place against our network. But cyberattacks are real, and we need to be prepared for them to happen.

Read More »
a red Alexa
Blog

Are Your Smart Home Devices Spying On You (Experts Say, Yes)

The integration of smart home devices has become synonymous with modern living. They offer convenience, efficiency, and connectivity at our fingertips. It’s natural these days to invite these devices into your home. Yet there is also the need to scrutinize their privacy implications. We’ll shed some light on the potential surveillance risks posed by smart home devices as well as discuss ways to safeguard your privacy in an era of increasing connectivity. 

Read More »
Need to Show the Tangible Value of Cybersecurity? Here's How
Blog

Need to Show the Tangible Value of Cybersecurity? Here’s How

Conveying the tangible value of cybersecurity initiatives to decision-makers can be challenging. The need for protection is clear, but executives want hard data to back up spending.

We’ll explore strategies to effectively show the concrete benefits of cybersecurity measures. These can help you make the case for stronger measures at your company. As well as help you understand how your investments return value.

Read More »
Steve Strom, Owner of Custom Internet Services LLC

About the Presenter

Steve is the Owner and CTO for Custom Internet Services. He has over 20 years of experience in Information Technology and taught IT for 13 years at the college level. He holds several IT certifications from Microsoft and CompTIA and has served as a reviewer or technical editor for several Microsoft certification course books. His cybersecurity experience includes holding several Global Information Assurance Certifications (GSEC, GCIA, GCIH, GCFA, GWEB, GICSP) as well as the NSTISSI 4011 sponsored by the Committee on National Security Systems.

Register for Our Next Webinar!

11 December 2025
10:30 AM - 11:00 AM
Virtual,

In today’s digital landscape, compliance management is more than just a checkbox—it’s a strategic approach to protecting your organization. Whether you're facing a cyber insurance claim or responding to regulatory […]

Free