Cybersecurity Blog Posts
In this collection of cybersecurity blog posts you’ll find simple and helpful articles about staying safe online. These resources for cybersecurity share easy tips, real examples, and clear advice to help you protect your data and avoid cyber threats.

Securing Your Supply Chain: Practical Cybersecurity Steps for Small Businesses
A report shows that 2023 supply chain cyberattacks in the U.S. affected 2,769 entities.

Simple Backup and Recovery Plans Every Small Business Needs
Simple backup tips every small business needs to protect data and recover quickly after disasters. Learn easy steps to keep your business up and running!

A Small Business Guide to Implementing 2FA
Multi-Factor Authentication is one of the most effective steps you can take to protect your business from cyber threats.

Unexpected Ways hackers Can Access Your Accounts
it is easy for hackers to take advantage of our online weaknesses

How Do Websites use My data?
Websites store and use user data in many ways, usually to personalize content, show ads, and make the user experience better.

Complete Guide to Strong Passwords and Authentication
A strong password is the first thing that will protect you from hackers, but it’s not the only thing that will do the job.

What is Password Spraying
password spraying is a complex type of cyberattack that uses weak passwords to get into multiple user accounts without permission.

Ultimate Guide to Safe Cloud Storage
Since we live in a digital world, cloud storage is an important tool for both personal and business use. So long as they have an internet connection, users can store and get to their info from anywhere at any time.
About the Presenter
Steve is the Owner and CTO for Custom Internet Services. He has over 20 years of experience in Information Technology and taught IT for 13 years at the college level. He holds several IT certifications from Microsoft and CompTIA and has served as a reviewer or technical editor for several Microsoft certification course books. His cybersecurity experience includes holding several Global Information Assurance Certifications (GSEC, GCIA, GCIH, GCFA, GWEB, GICSP) as well as the NSTISSI 4011 sponsored by the Committee on National Security Systems.
