Blog

Understanding the Importance of Vulnerability Management
Vulnerability management provides a proactive line of defense against bad actors looking to find and exploit security weaknesses or vulnerabilities.

Does Security Compliance Really Matter?
To foster good relationships with your customers and shareholders, and avoid fines and breaches, companies must maintain a compliant cybersecurity structure.

Navigating Cloud Compliance: Essential Regulations in the Digital Age
It is vital that organizations realize that cloud compliance is not merely checking items off a list. It requires thoughtful consideration and a great deal of planning. Operating from a proactive stance.

Are Hackers Coming to the Good Side?
Recently, organizations big and small have found real value in hiring people to break into their systems. It’s called “ethical hacking,” and has become a surprisingly popular security tool.

Hacking For Good? It’s Possible, Lucrative and Legal
Hacking isn’t always a malicious attempt to prey on your systems and data. Sometimes it can be used for good!

Hackers…Save the Day?
Hackers are the arch nemesis of cybersecurity teams everywhere. But what if there was a good kind of hacking too?

Why Is Penetration Testing So Important for My Business?
Pen Testing let’s companies regularly check the effectiveness of their cybersecurity program, making sure that hackers, whether they are black, grey, or white, are kept at bay.

Announcing Season 4
Custom Internet Services is excited to announce Season 4 of our Practical Cybersecurity Webinar Series! These short, 30 minute webinars are provided free of charge to businesses and organizations with questions about improving their cybersecurity stance.

Social Media: The Pros, Cons and the Security Policy
Social media has proven to be a powerful communications tool for both business and government organizations, but its powers can be used to harm as well as help. A solid social media policy and security plan that is implemented with care, will vastly improve your social media strategy and protect employees’ privacy.
About the Presenter
Steve is the Owner and CTO for Custom Internet Services. He has over 20 years of experience in Information Technology and taught IT for 13 years at the college level. He holds several IT certifications from Microsoft and CompTIA and has served as a reviewer or technical editor for several Microsoft certification course books. His cybersecurity experience includes holding several Global Information Assurance Certifications (GSEC, GCIA, GCIH, GCFA, GWEB, GICSP) as well as the NSTISSI 4011 sponsored by the Committee on National Security Systems.
Register for Our Next Webinar!
Let’s face it—most of us dread having to create passwords, especially when juggling numbers, capital letters, and special characters. But effective password management doesn’t have to be a headache. In […]