Webinar Resources
Cybersecurity Spelled Out
If even the thought of cybersecurity gives you a headache, then this is for you. The Critical Security Controls have become a global standard of what to do to develop a secure network environment. In this seminar we’ll introduce the Critical Security Controls and learn how these can work for you.

Lost Laptops & Stolen Cells
It’s every person’s worst nightmare – someone steals your cell phone or laptop, and there goes photos, bank information, and your digital life. But if it’s got business information, things can get even worse. What do we do to prepare for, and then recover from, such a traumatic event?

Getting Your “Digital” Clouds Under Control
The proliferation of easy-to-use cloud tools means it’s easier than ever for your business data to end up in locations you never intended, or even to be lost forever. How do you control this sprawl when employees just want ease of use? And more importantly, how do you make sure your data doesn’t get lost in this cloud universe?

Get Ready for Windows 11
Windows 10 will reach end of support before you know it! After October 14, 2025, no more security updates will be issued . So what do you need to get ready to more to Windows 11?

What’s Included in Microsoft 365?
Let’s take a look at Microsoft 365 Business Premium and give a quick overview of all the nifty tools now ready for your use.

Intro to Microsoft Copilot
AI – it’s definitely the next big thing! And you’ve probably already seen AI integrated into all sorts of processes and solutions. If you’ve wondered what this all means, join us for an introduction to Microsoft Copilot. We’ll see how it’s integrated into Office, and demo a few things we can do with Copilot.

Easy Policy Management
You know policy is important, after all that’s what guides how your business works. But how do you create appropriate IT policy, and then make sure that everyone signs off on that policy? In this webinar, we’ll show you an easy way to create policy and track policy acknowledgement.
Preparing for Insider Threats
No one likes to think that someone in the organization might intentionally destroy data or leak information. Yet data shows over 1/3 of data breaches are caused by insider threats. How do you plan and prepare for this type of risk?
Backup Planning
In this session about backup planning, we’ll introduce the current 3-2-1 backup best practice, discuss immutability with regards to backups, and learn what needs to be protected.
About the Presenter
Steve is the Owner and CTO for Custom Internet Services. He has over 20 years of experience in Information Technology and taught IT for 13 years at the college level. He holds several IT certifications from Microsoft and CompTIA and has served as a reviewer or technical editor for several Microsoft certification course books. His cybersecurity experience includes holding several Global Information Assurance Certifications (GSEC, GCIA, GCIH, GCFA, GWEB, GICSP) as well as the NSTISSI 4011 sponsored by the Committee on National Security Systems.
Register for Our Next Webinar!
We all like saving money, don’t we? So, when we’re faced with the choice of using a free or really inexpensive email provider versus a more expensive option, the temptation […]