Presented by

Logo for Custom Internet Services LLC

Preparing for Insider Threats

No one likes to think that someone in the organization might intentionally destroy data or leak information. Yet data shows over 1/3 of data breaches are caused by insider threats. How do you plan and prepare for this type of risk?

You Might Also Be Interested In...

"Insider Threats Are Getting More Dangerous! Here's How to Stop Them"

Insider Threats Are Getting More Dangerous! Here's How to Stop Them

One of the most difficult types of attacks to detect are those performed by insiders. An “insider” would be anyone that has legitimate access to your company network and data. This would be via a login or other authorized connection. It’s important for companies to understand what makes up an insider threat. That’s the first step towards mitigation.

6 Reasons Access Management Has Become a Critical Part of Cybersecurity

6 Reasons Access Management Has Become a Critical Part of Cybersecurity

Cybersecurity has become paramount for businesses and individuals alike. Cyber threats abound, and data breaches and malware attacks are costly. Attacks come from all vectors, including the cloud tools you use every day. 

10 Biggest Cybersecurity Mistakes of Small Companies

10 Biggest Cybersecurity Mistakes of Small Companies

Cybercriminals can launch very sophisticated attacks. But it’s often lax cybersecurity practices that enable most breaches. This is especially true when it comes to small and mid-sized businesses (SMBs).

Steve Strom, Owner of Custom Internet Services LLC

About the Presenter

Steve is the Owner and CTO for Custom Internet Services. He has over 20 years of experience in Information Technology and taught IT for 13 years at the college level. He holds several IT certifications from Microsoft and CompTIA and has served as a reviewer or technical editor for several Microsoft certification course books. His cybersecurity experience includes holding several Global Information Assurance Certifications (GSEC, GCIA, GCIH, GCFA, GWEB, GICSP) as well as the NSTISSI 4011 sponsored by the Committee on National Security Systems.

Register for Our Next Webinar!

Easy Policy Management

December 12, 10:30 AM


You know policy is important, after all that's what guides how your business works. But how do you create appropriate IT policy, and then make sure that everyone signs off on that policy? In this webinar, we'll show you an easy way to create policy and track policy acknowledgement.