Presented by

Logo for Custom Internet Services LLC

Lost Laptops & Stolen Cells

What To Do About Lost Devices

What to do about lost devices.

It’s every person’s worst nightmare – someone steals your cell phone or laptop, and there goes photos, bank information, and your digital life. But if it’s got business information, things can get even worse. What do we do to prepare for, and then recover from, such a traumatic event?

Coming Soon…

Post-Webinar Survey

Help us improve our webinar offerings by taking this short, post-webinar survey.

Webinar Survey: Lost Laptops & Stolen Cells
7

How comfortable were you with this topic BEFORE attending this webinar?*

How comfortable were you with this topic AFTER attending this webinar?*

What do you plan to do differently after attending this webinar?*

Do you have any additional questions about this topic?*

Please enter your question(s) here:

Do you have any suggestions for future webinar topics?

Is there anything else you would like us to know about this webinar?

Let's stay in touch!
3

How did you learn about this webinar?*

Would you like to receive emails about future webinars from Practical Cybersecurity?*

Please sign me up for emails from Practical Cybersecurity

Contact Information (Optional)
If you would like us to respond to your questions submitted through this survey, please share your name and email and we will be in touch. Information provided in this section will be used only to follow-up regarding questions you may have submitted. We will not use this information for marketing purposes.
2

Name

Email

You Might Also Be Interested In...

8 Tips for Safeguarding Your Gadgets While Traveling

8 Tips for Safeguarding Your Gadgets While Traveling

Traveling with technology has become a necessity. Whether for work, communication, or entertainment, we rely heavily on our devices. But traveling exposes these gadgets to various risks. Theft, damage, and loss are common concerns.

A phone with a recycle sign on it

Important Steps to Take Before You Recycle a Mobile Phone Number

If you don’t properly detach your mobile phone number from all the accounts it’s used with, you can leave yourself open to identity theft, credit card fraud, and other crimes.

5 Things You Should Never Do On A Work Computer

5 Things You Should Never Do On A Work Computer

Whether you work remotely or in an office, the line between personal and work tasks can become blurred when working on your company computer.

Steve Strom, Owner of Custom Internet Services LLC

About the Presenter

Steve is the Owner and CTO for Custom Internet Services. He has over 20 years of experience in Information Technology and taught IT for 13 years at the college level. He holds several IT certifications from Microsoft and CompTIA and has served as a reviewer or technical editor for several Microsoft certification course books. His cybersecurity experience includes holding several Global Information Assurance Certifications (GSEC, GCIA, GCIH, GCFA, GWEB, GICSP) as well as the NSTISSI 4011 sponsored by the Committee on National Security Systems.

Register for Our Next Webinar!

14 August 2025
10:30 AM - 11:00 AM
Virtual,

“I’m just a small business – what could I have that is important to hackers?” You’ve probably heard this sentiment and may have used it to wonder why you should […]

Free