Logo: Practical Cybersecurity

Webinar Series

2nd Thursday of Every Month @ 10:30 AM

Next Topic

Lost Laptops & Stolen Cells:
What to Do About Lost Devices

Providing Solutions That Work Since 2003!

104 1/2 W 9th Ave Suite 500
Winfield, KS 67156

Mon - Thurs 8 am - 5 pm CT
Fri 8 am - 4 pm CT

sales@custominternet.biz

“But anyone can build a network, right?”

Ethernet Cable Connected to a Compartment Port To Build A Network

A lot of people believe that to build a network it is as simple as plugging a few wires together and setting up a few machines. In reality, building a good network is often more difficult than it seems.

Why Monitor My Network?

Man looking intently at his computer monitor

We all regularly monitor various things. Yet have you ever considered the importance of monitoring your computer network? If not, let me give you three reasons why regular network monitoring is something you should consider.

What Is The Cloud?

Finger touching cloud, lines in sky indicating networking

The idea of a “Cloud” can be difficult to grasp. I find that it helps to think back to something we’re all more familiar with – the water supply.

How Do I Begin Securing My Systems?

Laptop, computer, and extra monitor on desk

Take stock of the current state of computers, operating systems, network devices (switches, routers, controllers, radios, control systems, etc) WAN links, and other components. This would be a good time to contract with us for a Cybersecurity Assessment so that your network can be evaluated from an impartial perspective.

What Do I Look For In A Backup Provider?

Woman sitting at desk, working on a laptop computer.

Comparing backup providers can be difficult. Here are some things to consider:

Is the backup software easy for your users? Can it run automatically in a ‘hands off’ configuration? If you need to recover, how easily can you do it?

“I’ve Got Backups So I’m Fine, Right?”

Computer showing blurred-out data, with a cup of coffee and stack of books in the foreground

Many times, a small business owner forgets that one of the most valuable items in their business is the data, documents, and other intellectual property created by their employees.  So, by making backups, what you’re really doing is protecting some of the most valuable assets of your business.

Why Website Security Matters

Woman sitting at laptop and looking at a credit card as if considering website security

It can be difficult to understand what goes on behind the scenes of website security. And all those acronyms like TLS, HTTP, JPG, and more don’t make it any simpler. I’d like to help you understand the importance of securing your website.

“But we’re in Kansas. No hacker wants in our network!”

Windmill against a blue sky

You would not believe how many times I’ve heard this or a similar statement. It’s easy to think that because we’re in the middle of America, somehow that makes us undesirable to hackers. But that’s far from the truth. Hackers want in your network for many different reasons.

Incident Recovery For Your Business

Pirate flag on laptop screen indicating malware

Just how much downtime could your company endure and yet survive? Do you have critical services that customers depend on that need to be always on? Do you need a backup network immediately available? How quickly do you need to be able to recover your data? These are some of the questions you need to ask yourself when you start to think about Incident Recovery.