Logo: Practical Cybersecurity

Webinar Series

2nd Thursday of Every Month @ 10:30 AM

Next Topic

Preparing for Ransomware

Providing Solutions That Work Since 2003!

104 1/2 W 9th Ave Suite 500
Winfield, KS 67156

Mon - Thurs 8 am - 5 pm CT
Fri 8 am - 4 pm CT

sales@custominternet.biz

“But anyone can build a network, right?”

Ethernet Cable Connected to a Compartment Port To Build A Network

A lot of people believe that to build a network it is as simple as plugging a few wires together and setting up a few machines. In reality, building a good network is often more difficult than it seems.

Why Monitor My Network?

Man looking intently at his computer monitor

We all regularly monitor various things. Yet have you ever considered the importance of monitoring your computer network? If not, let me give you three reasons why regular network monitoring is something you should consider.

What Is The Cloud?

Finger touching cloud, lines in sky indicating networking

The idea of a “Cloud” can be difficult to grasp. I find that it helps to think back to something we’re all more familiar with – the water supply.

What Do I Look For In A Backup Provider?

Woman sitting at desk, working on a laptop computer.

Comparing backup providers can be difficult. Here are some things to consider:

Is the backup software easy for your users? Can it run automatically in a ‘hands off’ configuration? If you need to recover, how easily can you do it?

“I’ve Got Backups So I’m Fine, Right?”

Computer showing blurred-out data, with a cup of coffee and stack of books in the foreground

Many times, a small business owner forgets that one of the most valuable items in their business is the data, documents, and other intellectual property created by their employees.  So, by making backups, what you’re really doing is protecting some of the most valuable assets of your business.

Why Website Security Matters

Woman sitting at laptop and looking at a credit card as if considering website security

It can be difficult to understand what goes on behind the scenes of website security. And all those acronyms like TLS, HTTP, JPG, and more don’t make it any simpler. I’d like to help you understand the importance of securing your website.

“But we’re in Kansas. No hacker wants in our network!”

Windmill against a blue sky

You would not believe how many times I’ve heard this or a similar statement. It’s easy to think that because we’re in the middle of America, somehow that makes us undesirable to hackers. But that’s far from the truth. Hackers want in your network for many different reasons.

Incident Recovery For Your Business

Pirate flag on laptop screen indicating malware

Just how much downtime could your company endure and yet survive? Do you have critical services that customers depend on that need to be always on? Do you need a backup network immediately available? How quickly do you need to be able to recover your data? These are some of the questions you need to ask yourself when you start to think about Incident Recovery.

What Can Happen If My Network Is Breached?

Man sitting on couch with glasses in his hand and fingers pressed to his temples

There are many possible consequences that could result from a breach of your network or data. Here is a partial list of some of the consequences if your network is breached.