Presented by

Logo for Custom Internet Services LLC

What is a Firewall?
Why Does It Matter?

When your IT provider recommends a firewall that might cost a couple thousand dollars, what makes that worth more than the cheap firewall you can buy at Walmart? And if Windows comes with a built-in firewall, why do we even need to buy one at all? If you’ve ever been confused by this topic and wondered why you should spend money on something that Windows has included, then this webinar is for you. We’ll give a brief intro to different types of firewalls and their use, so you can understand the differences.

Post-Webinar Survey

Help us improve our webinar offerings by taking this short, post-webinar survey.

Webinar Survey: Lost Laptops & Stolen Cells
7

How comfortable were you with this topic BEFORE attending this webinar?*

How comfortable were you with this topic AFTER attending this webinar?*

What do you plan to do differently after attending this webinar?*

Do you have any additional questions about this topic?*

Please enter your question(s) here:

Do you have any suggestions for future webinar topics?

Is there anything else you would like us to know about this webinar?

Let's stay in touch!
3

How did you learn about this webinar?*

Would you like to receive emails about future webinars from Practical Cybersecurity?*

Please sign me up for emails from Practical Cybersecurity

Contact Information (Optional)
If you would like us to respond to your questions submitted through this survey, please share your name and email and we will be in touch. Information provided in this section will be used only to follow-up regarding questions you may have submitted. We will not use this information for marketing purposes.
2

Name

Email

You Might Also Be Interested In...

Woman sitting in front of a laptop with her head resting on her hand

Is My Network Really Under Attack?

Part of what makes the need for cybersecurity so hard to understand is that most of us really can’t “see” cyber attacks taking place against our network. But cyberattacks are real, and we need to be prepared for them to happen.

A lock with 1 and 0 in the back ground of it

7 Smart Ways to Secure Your Wireless Printer & Keep Your Home Network Safe

Many people worry about someone hacking their computer. But they’re not really thinking about their wireless printer getting breached. It’s a tool that most individuals use sporadically. For example, when you want to print out tax forms or mailing labels.

Need to Show the Tangible Value of Cybersecurity? Here's How

Need to Show the Tangible Value of Cybersecurity? Here's How

Conveying the tangible value of cybersecurity initiatives to decision-makers can be challenging. The need for protection is clear, but executives want hard data to back up spending. We’ll explore strategies to effectively show the concrete benefits of cybersecurity measures. These can help you make the case for stronger measures at your company. As well as help you understand how your investments return value.

Steve Strom, Owner of Custom Internet Services LLC

About the Presenter

Steve is the Owner and CTO for Custom Internet Services. He has over 20 years of experience in Information Technology and taught IT for 13 years at the college level. He holds several IT certifications from Microsoft and CompTIA and has served as a reviewer or technical editor for several Microsoft certification course books. His cybersecurity experience includes holding several Global Information Assurance Certifications (GSEC, GCIA, GCIH, GCFA, GWEB, GICSP) as well as the NSTISSI 4011 sponsored by the Committee on National Security Systems.

Register for Our Next Webinar!

13 November 2025
10:30 AM - 11:00 AM
Virtual,

Your firewall might seem like a fortress, but even the strongest defenses can be breached. That’s where vulnerability and penetration testing comes in. In this webinar, we’ll explore how security pen […]

Free