Blog
Don’t Be a Victim – Common Mobile Malware Traps
Mobile malware is just like its computer counterpart. It is malicious software designed to harm your device or steal your data. It can arrive in various forms, from sneaky apps to deceptive links. Ignorance is not bliss here. Understanding the common traps is your first line of defense.
8 Strategies for Tackling Technical Debt at Your Company
Addressing technical debt is essential for maintaining a robust, efficient technology environment. Here are eight strategies to tackle technical debt at your company.
Announcing Series 2!
Custom Internet Services is excited to announce Series 2 of our Practical Cybersecurity Webinar Series! These short, 30 minute webinars are provided free of charge to businesses and organizations with
Why Securing Your Software Supply Chain is Critical
Protecting the entire process that creates and delivers your software is very important. From the tools developers use to the way updates reach your computer, every step matters. A breach or vulnerability in any part of this chain can have severe consequences.
Celebrate Cybersecurity Awareness Month with Cybersecurity Bingo!
To celebrate 2024’s Cybersecurity Awareness Month, Custom Internet Services is hosting a Cybersecurity Bingo Contest!
Windows 10: The Final Countdown – It’s Time to Upgrade Your PC
It’s time to upgrade to Windows 11. This is especially true for business users with many systems to check and upgrade. This change isn’t just about getting new features. It’s about ensuring your PC stays secure, fast, and capable.
8 Tips for Safeguarding Your Gadgets While Traveling
Traveling with technology has become a necessity. Whether for work, communication, or entertainment, we rely heavily on our devices. But traveling exposes these gadgets to various risks. Theft, damage, and loss are common concerns.
Digital Defense: Essential Security Practices for Remote Workers
The rise of remote work has redefined the modern workplace. Gone are the days of rigid office schedules and commutes. But with this flexibility comes a new set of challenges – cybersecurity threats. Remote work environments often introduce vulnerabilities to your organization’s data and systems.
Phishing 2.0: How AI is Amplifying the Danger and What You Can Do
Phishing has always been a threat. Now, with AI, it’s more dangerous than ever. Phishing 2.0 is here. It’s smarter, more convincing, and harder to detect. Understanding this new threat is crucial.
About the Presenter
Steve is the Owner and CTO for Custom Internet Services. He has over 20 years of experience in Information Technology and taught IT for 13 years at the college level. He holds several IT certifications from Microsoft and CompTIA and has served as a reviewer or technical editor for several Microsoft certification course books. His cybersecurity experience includes holding several Global Information Assurance Certifications (GSEC, GCIA, GCIH, GCFA, GWEB, GICSP) as well as the NSTISSI 4011 sponsored by the Committee on National Security Systems.
Register for Our Next Webinar!
We all like saving money, don’t we? So, when we’re faced with the choice of using a free or really inexpensive email provider versus a more expensive option, the temptation […]