Webinar Series

Presented by Custom Internet Services LLC

Logo for Custom Internet Services LLC

What is a Firewall?
Why Does It Matter?

When your IT provider recommends a firewall that might cost a couple thousand dollars, what makes that worth more than the cheap firewall you can buy at Walmart? And if Windows comes with a built-in firewall, why do we even need to buy one at all? If you’ve ever been confused by this topic and wondered why you should spend money on something that Windows has included, then this webinar is for you. We’ll give a brief intro to different types of firewalls and their use, so you can understand the differences.

You Might Also Be Interested In...

Woman sitting in front of a laptop with her head resting on her hand

Is My Network Really Under Attack?

Part of what makes the need for cybersecurity so hard to understand is that most of us really can’t “see” cyber attacks taking place against our network. But cyberattacks are real, and we need to be prepared for them to happen.

A lock with 1 and 0 in the back ground of it

7 Smart Ways to Secure Your Wireless Printer & Keep Your Home Network Safe

Many people worry about someone hacking their computer. But they’re not really thinking about their wireless printer getting breached. It’s a tool that most individuals use sporadically. For example, when you want to print out tax forms or mailing labels.

Need to Show the Tangible Value of Cybersecurity? Here's How

Need to Show the Tangible Value of Cybersecurity? Here's How

Conveying the tangible value of cybersecurity initiatives to decision-makers can be challenging. The need for protection is clear, but executives want hard data to back up spending. We’ll explore strategies to effectively show the concrete benefits of cybersecurity measures. These can help you make the case for stronger measures at your company. As well as help you understand how your investments return value.

Steve Strom, Owner of Custom Internet Services LLC

About the Presenter

Steve is the Owner and CTO for Custom Internet Services. He has over 20 years of experience in Information Technology and taught IT for 13 years at the college level. He holds several IT certifications from Microsoft and CompTIA and has served as a reviewer or technical editor for several Microsoft certification course books. His cybersecurity experience includes holding several Global Information Assurance Certifications (GSEC, GCIA, GCIH, GCFA, GWEB, GICSP) as well as the NSTISSI 4011 sponsored by the Committee on National Security Systems.

Register for Our Next Webinar!

Preparing for Insider Threats

November 14, 10:30 AM


No one likes to think that someone in the organization might intentionally destroy data or leak information. Yet data shows over 1/3 of data breaches are caused by insider threats. How do you plan and prepare for this type of risk?