Presented by

Logo for Custom Internet Services LLC

What is a Firewall?
Why Does It Matter?

When your IT provider recommends a firewall that might cost a couple thousand dollars, what makes that worth more than the cheap firewall you can buy at Walmart? And if Windows comes with a built-in firewall, why do we even need to buy one at all? If you’ve ever been confused by this topic and wondered why you should spend money on something that Windows has included, then this webinar is for you. We’ll give a brief intro to different types of firewalls and their use, so you can understand the differences.

You Might Also Be Interested In...

Woman sitting in front of a laptop with her head resting on her hand

Is My Network Really Under Attack?

Part of what makes the need for cybersecurity so hard to understand is that most of us really can’t “see” cyber attacks taking place against our network. But cyberattacks are real, and we need to be prepared for them to happen.

A lock with 1 and 0 in the back ground of it

7 Smart Ways to Secure Your Wireless Printer & Keep Your Home Network Safe

Many people worry about someone hacking their computer. But they’re not really thinking about their wireless printer getting breached. It’s a tool that most individuals use sporadically. For example, when you want to print out tax forms or mailing labels.

Need to Show the Tangible Value of Cybersecurity? Here's How

Need to Show the Tangible Value of Cybersecurity? Here's How

Conveying the tangible value of cybersecurity initiatives to decision-makers can be challenging. The need for protection is clear, but executives want hard data to back up spending.We’ll explore strategies to effectively show the concrete benefits of cybersecurity measures. These can help you make the case for stronger measures at your company. As well as help you understand how your investments return value.

Steve Strom, Owner of Custom Internet Services LLC

About the Presenter

Steve is the Owner and CTO for Custom Internet Services. He has over 20 years of experience in Information Technology and taught IT for 13 years at the college level. He holds several IT certifications from Microsoft and CompTIA and has served as a reviewer or technical editor for several Microsoft certification course books. His cybersecurity experience includes holding several Global Information Assurance Certifications (GSEC, GCIA, GCIH, GCFA, GWEB, GICSP) as well as the NSTISSI 4011 sponsored by the Committee on National Security Systems.

Register for Our Next Webinar!

Easy Policy Management

December 12, 10:30 AM

You know policy is important, after all that's what guides how your business works. But how do you create appropriate IT policy, and then make sure that everyone signs off on that policy? In this webinar, we'll show you an easy way to create policy and track policy acknowledgement.