Presented by

Logo for Custom Internet Services LLC

The topic of cybersecurity can seem more than a little overwhelming, and you’re probably wondering where to begin. The good news is that we’re here to help you as you begin this journey of securing your network and devices.

Understanding the Need for Cybersecurity

The articles and webinars on this site are designed to give you an appreciation for various aspects of cybersecurity and the challenges that all network and device owners face in trying to build a secure environment.

First Steps

After you've gained an appreciation for the scope of the cybersecurity problem, the next step is to begin with the "low hanging fruit". These items are often relatively simple to remediate and give a large return for your investment in time and resources. Beginning with these items will pay big dividends as you begin your cybersecurity journey.

Newest Resources

Image of an cartoon airplane pilot flying over an open laptop that shows graphs and the text, "An Introduction to Copilot". Text on the right side of the image reads, "Practical Cybersecurity: Intro to Microsoft Copilot. Presented by Custom Internet Services."
Webinar

Intro to Microsoft Copilot

AI – it’s definitely the next big thing! And you’ve probably already seen AI integrated into all sorts of processes and solutions. If you’ve wondered what this all means, join us for an introduction to Microsoft Copilot. We’ll see how it’s integrated into Office, and demo a few things we can do with Copilot.

Read More »
Easy Policy Management
Webinar

Easy Policy Management

You know policy is important, after all that’s what guides how your business works. But how do you create appropriate IT policy, and then make sure that everyone signs off on that policy? In this webinar, we’ll show you an easy way to create policy and track policy acknowledgement.

Read More »
Webinar

Preparing for Insider Threats

No one likes to think that someone in the organization might intentionally destroy data or leak information. Yet data shows over 1/3 of data breaches are caused by insider threats. How do you plan and prepare for this type of risk?

Read More »
Don't Be A Victim: Common Mobile Malware Traps
Blog

Don’t Be a Victim – Common Mobile Malware Traps

Mobile malware is just like its computer counterpart. It is malicious software designed to harm your device or steal your data. It can arrive in various forms, from sneaky apps to deceptive links. Ignorance is not bliss here. Understanding the common traps is your first line of defense.

Read More »
Steve Strom, Owner of Custom Internet Services LLC

About the Presenter

Steve is the Owner and CTO for Custom Internet Services. He has over 20 years of experience in Information Technology and taught IT for 13 years at the college level. He holds several IT certifications from Microsoft and CompTIA and has served as a reviewer or technical editor for several Microsoft certification course books. His cybersecurity experience includes holding several Global Information Assurance Certifications (GSEC, GCIA, GCIH, GCFA, GWEB, GICSP) as well as the NSTISSI 4011 sponsored by the Committee on National Security Systems.

Register for Our Next Webinar!

13 February 2025
10:30 AM - 11:00 AM
Virtual,

You've just purchased some version of Microsoft 365. But it comes with so many things! What do we do with all these apps? That's what we'll look at in this webinar. We'll focus on Microsoft 365 Business Premium and give a quick overview of all the nifty tools now ready for your use.

Free