Presented by

Logo for Custom Internet Services LLC

Intro to Microsoft Copilot

AI – it’s definitely the next big thing! And you’ve probably already seen AI integrated into all sorts of processes and solutions. If you’ve wondered what this all means, join us for an introduction to Microsoft Copilot. We’ll see how it’s integrated into Office, and demo a few things we can do with Copilot.

You Might Also Be Interested In...

What Is Microsoft Security Copilot? Should You Use It?

What Is Microsoft Security Copilot? Should You Use It?

One of the most difficult types of attacks to detect are those performed by insiders. An “insider” would be anyone that has legitimate access to your company network and data. This would be via a login or other authorized connection. It’s important for companies to understand what makes up an insider threat. That’s the first step towards mitigation.

A person logging in on a laptop with the text, "Is It Time to Ditch the Passwords for More Secure Passkeys?"

Is It Time to Ditch the Passwords for More Secure Passkeys?

Passwords are the most used method of authentication, but they are also one of the weakest. Passwords are often easy to guess or steal. Also, many people use the same password across several accounts. This makes them vulnerable to cyber-attacks.

10 Tips to Help Small Businesses Get Ready for the Unexpected

10 Tips to Help Small Businesses Get Ready for the Unexpected

What would you do if your business suffered a ransomware attack tomorrow? Do you have a contingency plan in case of a tornado, hurricane, or earthquake? The unexpected can happen anytime, and small businesses can get hit particularly hard.

Steve Strom, Owner of Custom Internet Services LLC

About the Presenter

Steve is the Owner and CTO for Custom Internet Services. He has over 20 years of experience in Information Technology and taught IT for 13 years at the college level. He holds several IT certifications from Microsoft and CompTIA and has served as a reviewer or technical editor for several Microsoft certification course books. His cybersecurity experience includes holding several Global Information Assurance Certifications (GSEC, GCIA, GCIH, GCFA, GWEB, GICSP) as well as the NSTISSI 4011 sponsored by the Committee on National Security Systems.

Register for Our Next Webinar!

08 May 2025
10:30 AM - 11:00 AM
Virtual,

It used to be that losing a cell phone or laptop wasn’t really that big a deal. But in today’s cloud-connected world, most of us carry the keys to our […]