Blog

What Are Insider Threats?
Insider threats often start with simple mistakes. Understand how everyday actions, access, and awareness can help keep your workplace data safe.

The Quiet Risk of “Just Helping Out” at Work
Learn how simple ‘helpful’ actions at work—like sharing logins or rushing requests—can create hidden security risks and how to stay safe.

What Happens After A Breach?
Learn what happens inside a company after a data breach, including stress on workers, long recovery steps, and how teams rebuild trust and routines.

Work from Anywhere, Secure Everywhere
Learn how to stay safe while working from anywhere with simple tips like using strong passwords, VPNs, and secure networks to protect your data.

Year-End Roundup: Your Favorite Practical Cybersecurity Resources of 2025
These resources reflect what mattered most to you in 2025. As we head into 2026, we’ll keep delivering content that helps you stay informed and confident in protecting your business.

Best Practices to Protect PHI – and Why Everyone Should Know How
Cybersecurity isn’t just a technical checklist—it’s a critical business strategy that protects what matters most: Your personal and professional digital assets!

Understanding the Importance of Vulnerability Management
Vulnerability management provides a proactive line of defense against bad actors looking to find and exploit security weaknesses or vulnerabilities.

Does Security Compliance Really Matter?
To foster good relationships with your customers and shareholders, and avoid fines and breaches, companies must maintain a compliant cybersecurity structure.

Navigating Cloud Compliance: Essential Regulations in the Digital Age
It is vital that organizations realize that cloud compliance is not merely checking items off a list. It requires thoughtful consideration and a great deal of planning. Operating from a proactive stance.
About the Presenter
Steve is the Owner and CTO for Custom Internet Services. He has over 20 years of experience in Information Technology and taught IT for 13 years at the college level. He holds several IT certifications from Microsoft and CompTIA and has served as a reviewer or technical editor for several Microsoft certification course books. His cybersecurity experience includes holding several Global Information Assurance Certifications (GSEC, GCIA, GCIH, GCFA, GWEB, GICSP) as well as the NSTISSI 4011 sponsored by the Committee on National Security Systems.