The topic of cybersecurity can seem more than a little overwhelming, and you’re probably wondering where to begin. The good news is that we’re here to help you as you begin this journey of securing your network and devices.
Understanding the Need for Cybersecurity
The articles and webinars on this site are designed to give you an appreciation for various aspects of cybersecurity and the challenges that all network and device owners face in trying to build a secure environment.
First Steps
After you've gained an appreciation for the scope of the cybersecurity problem, the next step is to begin with the "low hanging fruit". These items are often relatively simple to remediate and give a large return for your investment in time and resources. Beginning with these items will pay big dividends as you begin your cybersecurity journey.
What's Next
Now that the initial steps are completed, it's time to consider further enhancing your cybersecurity stand. The human element is often the weakest link in securing any environment so it's important to educate yourself as well those you work with. Use these resources to help you lay out a roadmap for future growth and development.
Newest Resources

Are Hackers Coming to the Good Side?
Recently, organizations big and small have found real value in hiring people to break into their systems. It’s called “ethical hacking,” and has become a surprisingly popular security tool.

Hacking For Good? It’s Possible, Lucrative and Legal
Hacking isn’t always a malicious attempt to prey on your systems and data. Sometimes it can be used for good!

Hackers…Save the Day?
Hackers are the arch nemesis of cybersecurity teams everywhere. But what if there was a good kind of hacking too?

Why Is Penetration Testing So Important for My Business?
Pen Testing let’s companies regularly check the effectiveness of their cybersecurity program, making sure that hackers, whether they are black, grey, or white, are kept at bay.

Announcing Season 4
Custom Internet Services is excited to announce Season 4 of our Practical Cybersecurity Webinar Series! These short, 30 minute webinars are provided free of charge to businesses and organizations with questions about improving their cybersecurity stance.

Social Media: The Pros, Cons and the Security Policy
Social media has proven to be a powerful communications tool for both business and government organizations, but its powers can be used to harm as well as help. A solid social media policy and security plan that is implemented with care, will vastly improve your social media strategy and protect employees’ privacy.

Are Your Social Media Profiles Secure?
Seven out of every ten social media users change their privacy settings to manage their online privacy. Are you one of them?

Are You Posting Too Much Information to Social Media?
Constantly revealing our favorite hangout spots and activities can actually open the door to serious risks…both online and offline.

Friends, Followers, and Frauds
In a world driven by ‘Likes’, how can we manage the security issues of social media? We’ll look at some of the security problems introduced by social media, how these factors are leveraged by bad actors, and some ways you can protect yourself.
About the Presenter
Steve is the Owner and CTO for Custom Internet Services. He has over 20 years of experience in Information Technology and taught IT for 13 years at the college level. He holds several IT certifications from Microsoft and CompTIA and has served as a reviewer or technical editor for several Microsoft certification course books. His cybersecurity experience includes holding several Global Information Assurance Certifications (GSEC, GCIA, GCIH, GCFA, GWEB, GICSP) as well as the NSTISSI 4011 sponsored by the Committee on National Security Systems.
Register for Our Next Webinar!
In today’s digital landscape, compliance management is more than just a checkbox—it’s a strategic approach to protecting your organization. Whether you're facing a cyber insurance claim or responding to regulatory […]