Webinar Series

Presented by Custom Internet Services LLC

Logo for Custom Internet Services LLC

What Does Cyber Insurance Expect of Me?

Cyber insurance almost seems like this black hole that is mysterious to understand. Yet if we’re victims of a cyber incident – something like ransomware, social engineering, business email compromise, etc – we’re going to want that insurance to pay off. So what can we do to enhance the likelihood that cyber insurance will pay when needed? What does my cyber insurance policy expect of me? That’s what we’re going to explore in this fast paced session.

You Might Also Be Interested In...

What's Changing In The Cybersecurity Insurance Market

What Does Cyber Insurance Expect of Me?

Cybersecurity insurance is still a pretty new concept for many SMBs. It was initially introduced in the 1990s to provide coverage for large enterprises. It covered things like data processing errors and online media. Here are some of the cyber liability insurance trends you need to know about.

10 Tips to Help Small Businesses Get Ready for the Unexpected

10 Tips to Help Small Businesses Get Ready for the Unexpected

What would you do if your business suffered a ransomware attack tomorrow? Do you have a contingency plan in case of a tornado, hurricane, or earthquake? The unexpected can happen anytime, and small businesses can get hit particularly hard.

Examples of How a Data Breach Can Cost Your Business For Years

Examples of How a Data Breach Can Cost Your Business For Years

In the digital age, data is the lifeblood of businesses. It fuels operations, decision-making, and customer interactions. But there is a dark underbelly of this data-centric landscape. It’s the persistent threat of data breaches.

Steve Strom, Owner of Custom Internet Services LLC

About the Presenter

Steve is the Owner and CTO for Custom Internet Services. He has over 20 years of experience in Information Technology and taught IT for 13 years at the college level. He holds several IT certifications from Microsoft and CompTIA and has served as a reviewer or technical editor for several Microsoft certification course books. His cybersecurity experience includes holding several Global Information Assurance Certifications (GSEC, GCIA, GCIH, GCFA, GWEB, GICSP) as well as the NSTISSI 4011 sponsored by the Committee on National Security Systems.

Register for Our Next Webinar!

Backup Planning

October 10, 10:30 AM


If there’s one thing certain in life, it’s that things will fail. Take your business computer system for example – did you realize that the data on that computer and time invested in creating and maintaining that data is worth far more than the computer itself? At the heart of protecting that data is a robust backup and recovery strategy. In this session, we’ll introduce the current 3-2-1 backup best practice, discuss immutability with regards to backups, and learn what needs to be protected.