Presented by

Logo for Custom Internet Services LLC

Blog

What's Changing In The Cybersecurity Insurance Market
Blog

What’s Changing in the Cybersecurity Insurance Market?

Cybersecurity insurance is still a pretty new concept for many SMBs. It was initially introduced in the 1990s to provide coverage for large enterprises. It covered things like data processing errors and online media. Here are some of the cyber liability insurance trends you need to know about.

Read More »
a lock on a map
Blog

5 Ways to Balance User Productivity with Solid Authentication Protocols

One constant struggle in offices is the balance between productivity and security. If you give users too much freedom in your network, risk increases. But add too many security gates, and productivity can dwindle. There are ways to have both secure and productive users. It simply takes adopting some solutions that can help. These are tools that improve authentication security. But do it in a way that keeps user convenience in mind.

Read More »
A pencil and a checklist with the words, "What to Include in a Year-End Technology Infrastructure Review"
Blog

What to Include in a Year-end Technology Infrastructure Review

When the year is coming to a close, it’s the perfect time to plan for the future. Most businesses begin the year with the hope of growing and improving operations. Much of how a business operates depends on technology. So, it makes sense to look to your IT for areas of optimization. This year-end, take some time to do a technology review with your IT team or managed IT provider. This will set you up for success and security in the coming year.

Read More »
a lock in a blue circle
Blog

What Are the Advantages of Implementing Conditional Access?

It seems that nearly as long as passwords have been around, they’ve been a major source of security concern. Eighty-one percent of security incidents happen due to stolen or weak passwords. Additionally, employees continue to neglect the basics of good cyber hygiene. Below, we’ll explain what conditional access is. As well as how it works with multi-factor authentication (MFA). We’ll also review the advantages of moving to a conditional access process.

Read More »
a lock with chains on it
Blog

Simple Guide to Follow for Better Endpoint Protection

Endpoints make up much of a company’s network and IT infrastructure. This is a collection of computers, mobile devices, servers, and smart gadgets. As well as other IoT devices that all connect to the company network. In this guide, we’ll provide you with straightforward solutions. Solutions focused on protection of endpoint devices.

Read More »
"Insider Threats Are Getting More Dangerous! Here's How to Stop Them"
Blog

Insider Threats Are Getting More Dangerous! Here’s How to Stop Them

One of the most difficult types of attacks to detect are those performed by insiders. An “insider” would be anyone that has legitimate access to your company network and data. This would be via a login or other authorized connection. It’s important for companies to understand what makes up an insider threat. That’s the first step towards mitigation.

Read More »
Someone Holding a credit card and typing on a keyboard
Blog

9 Urgent Security Tips for Online Holiday Shopping

The holiday shopping season is taking off. This means that scammers have also revved up their engines. They’re primed and ready to take advantage of all those online transactions. Here are some of the most critical safety tips to improve your online holiday shopping.

Read More »
A robber pointing a flash light at an open letter with a skull on it
Blog

Business Email Compromise Jumped 81% Last Year! Learn How to Fight It

In recent years, electronic mail (email for short) has become an essential part of our daily lives. Many people use it for various purposes, including business transactions. With the increasing dependence on digital technology, cybercrime has grown. A significant cyber threat facing businesses today is Business Email Compromise (BEC).

Read More »
5 Things You Should Never Do On A Work Computer
Blog

5 Things You Should Never Do on a Work Computer

In a survey of over 900 employees, it was found that only 30% said they never used their work PC for personal activities. The other 70% admitted to using their work computer for various personal reasons. 

Some of the non-work-related things that people do on a work computer include:

Read More »
Steve Strom, Owner of Custom Internet Services LLC

About the Presenter

Steve is the Owner and CTO for Custom Internet Services. He has over 20 years of experience in Information Technology and taught IT for 13 years at the college level. He holds several IT certifications from Microsoft and CompTIA and has served as a reviewer or technical editor for several Microsoft certification course books. His cybersecurity experience includes holding several Global Information Assurance Certifications (GSEC, GCIA, GCIH, GCFA, GWEB, GICSP) as well as the NSTISSI 4011 sponsored by the Committee on National Security Systems.

Register for Our Next Webinar!

10 July 2025
10:30 AM - 11:00 AM
Virtual,

We all like saving money, don’t we? So, when we’re faced with the choice of using a free or really inexpensive email provider versus a more expensive option, the temptation […]

Free