Blog
What is Blockchain Technology and How Does it Work?
Blockchain technology is changing the world. It is a system designed to keep records safe and secure. But how does it work?
5 Common Cyber Threats in 2025 (and How to Avoid Them)
Cyber threats are real and growing every day. In this digital age, it’s very important to protect yourself online.
How Password Managers Protect Your Accounts
Password managers help our accounts safe and make our lives easier. Consider using a password manager today to improve your online security.
Innovative Solutions to IoT Device Security
Good cyber habits help keep you safe from hackers on the internet. Let’s check some easy ways to stay safe online in 2025.
How Is Your Cyber Hygiene?
Good cyber habits help keep you safe from hackers on the internet. Let’s check some easy ways to stay safe online in 2025.
Top Practical Cybersecurity Resources of 2024
2024 was an exciting year for us with the launch of Practical Cybersecurity.
As we look forward to 2025, it seems appropriate to pause and reflect on the things we’ve learned in 2024.
Protect Yourself: 8 Steps to Take When You Get a Notice Your Data Was Breached
A business getting hacked is something you have little control over, but you can take important steps afterwards. We’ve outline the most important things to do to mitigate the financial losses if your data was breached.
Data Breach Damage Control: Avoid These Pitfalls
Data breaches are an unfortunate reality for businesses of all sizes. When a breach occurs, the immediate response is critical. How a company manages the aftermath can significantly impact its
6 Simple Steps to Enhance Your Email Security
Email is a fundamental communication tool for businesses and individuals alike. But it’s also a prime target for cybercriminals.
About the Presenter
Steve is the Owner and CTO for Custom Internet Services. He has over 20 years of experience in Information Technology and taught IT for 13 years at the college level. He holds several IT certifications from Microsoft and CompTIA and has served as a reviewer or technical editor for several Microsoft certification course books. His cybersecurity experience includes holding several Global Information Assurance Certifications (GSEC, GCIA, GCIH, GCFA, GWEB, GICSP) as well as the NSTISSI 4011 sponsored by the Committee on National Security Systems.
Register for Our Next Webinar!
We all like saving money, don’t we? So, when we’re faced with the choice of using a free or really inexpensive email provider versus a more expensive option, the temptation […]