Presented by

Logo for Custom Internet Services LLC

Easy Policy Management

You know policy is important, after all that’s what guides how your business works. But how do you create appropriate IT policy, and then make sure that everyone signs off on that policy? In this webinar, we’ll show you an easy way to create policy and track policy acknowledgement.

You Might Also Be Interested In...

5 Things You Should Never Do On A Work Computer

5 Things You Should Never Do On A Work Computer

One of the most difficult types of attacks to detect are those performed by insiders. An “insider” would be anyone that has legitimate access to your company network and data. This would be via a login or other authorized connection. It’s important for companies to understand what makes up an insider threat. That’s the first step towards mitigation.

10 Easy Steps to Building a Culture of Cyber Awareness

10 Easy Steps To Building A Culture Of Cyber Awareness

Cybercriminals can launch very sophisticated attacks. But it’s often lax cybersecurity practices that enable most breaches. This is especially true when it comes to small and mid-sized businesses (SMBs).

Digital Defense: Essential Security Practices For Remote Workers

Digital Defense: Essential Security Practices For Remote Workers

The rise of remote work has redefined the modern workplace. Gone are the days of rigid office schedules and commutes. But with this flexibility comes a new set of challenges – cybersecurity threats. Remote work environments often introduce vulnerabilities to your organization's data and systems.  

Steve Strom, Owner of Custom Internet Services LLC

About the Presenter

Steve is the Owner and CTO for Custom Internet Services. He has over 20 years of experience in Information Technology and taught IT for 13 years at the college level. He holds several IT certifications from Microsoft and CompTIA and has served as a reviewer or technical editor for several Microsoft certification course books. His cybersecurity experience includes holding several Global Information Assurance Certifications (GSEC, GCIA, GCIH, GCFA, GWEB, GICSP) as well as the NSTISSI 4011 sponsored by the Committee on National Security Systems.

Register for Our Next Webinar!

Intro to Microsoft Copilot

January 9, 10:30 AM


AI - it's definitely the next big thing! And you've probably already seen AI integrated into all sorts of processes and solutions. If you've wondered what this all means, join us for an introduction to Microsoft Copilot. We'll see how it's integrated into Office, and demo a few things we can do with Copilot.