The topic of cybersecurity can seem more than a little overwhelming, and you’re probably wondering where to begin. The good news is that we’re here to help you as you begin this journey of securing your network and devices.
Understanding the Need for Cybersecurity
The articles and webinars on this site are designed to give you an appreciation for various aspects of cybersecurity and the challenges that all network and device owners face in trying to build a secure environment.
First Steps
After you've gained an appreciation for the scope of the cybersecurity problem, the next step is to begin with the "low hanging fruit". These items are often relatively simple to remediate and give a large return for your investment in time and resources. Beginning with these items will pay big dividends as you begin your cybersecurity journey.
What's Next
Now that the initial steps are completed, it's time to consider further enhancing your cybersecurity stand. The human element is often the weakest link in securing any environment so it's important to educate yourself as well those you work with. Use these resources to help you lay out a roadmap for future growth and development.
Newest Resources
What is Password Spraying
password spraying is a complex type of cyberattack that uses weak passwords to get into multiple user accounts without permission.
Cybersecurity Spelled Out
If even the thought of cybersecurity gives you a headache, then this is for you. The Critical Security Controls have become a global standard of what to do to develop a secure network environment. In this seminar we’ll introduce the Critical Security Controls and learn how these can work for you.
Ultimate Guide to Safe Cloud Storage
Since we live in a digital world, cloud storage is an important tool for both personal and business use. So long as they have an internet connection, users can store and get to their info from anywhere at any time.
Can My Data Be Removed From the Dark Web?
It is very hard to find and delete all copies of your personal information after it has been leaked because there is no central authority and data can be easily copied across many platforms.
New Gmail Threats Targeting Users in 2025
Cybercriminals target Gmail a lot because it’s very popular. It also integrates with many other Google services.
10 Tips to Get The Most Out of Your Microsoft 365 Apps
Microsoft 365 is a strong set of tools created to make working together and staying safe easier on many devices and systems.
Where Do Deleted Files Go?
It may seem like the file is gone for good when you delete it from your computer.
Lost Laptops & Stolen Cells
It’s every person’s worst nightmare – someone steals your cell phone or laptop, and there goes photos, bank information, and your digital life. But if it’s got business information, things can get even worse. What do we do to prepare for, and then recover from, such a traumatic event?
7 New and Tricky Types of Malware to Watch Out For
Malware is a huge threat in the digital world.
About the Presenter
Steve is the Owner and CTO for Custom Internet Services. He has over 20 years of experience in Information Technology and taught IT for 13 years at the college level. He holds several IT certifications from Microsoft and CompTIA and has served as a reviewer or technical editor for several Microsoft certification course books. His cybersecurity experience includes holding several Global Information Assurance Certifications (GSEC, GCIA, GCIH, GCFA, GWEB, GICSP) as well as the NSTISSI 4011 sponsored by the Committee on National Security Systems.
Register for Our Next Webinar!
We all like saving money, don’t we? So, when we’re faced with the choice of using a free or really inexpensive email provider versus a more expensive option, the temptation […]