Logo: Practical Cybersecurity

Webinar Series

2nd Thursday of Every Month @ 10:30 AM

Next Topic

Lost Laptops & Stolen Cells:
What to Do About Lost Devices

Providing Solutions That Work Since 2003!

104 1/2 W 9th Ave Suite 500
Winfield, KS 67156

Mon - Thurs 8 am - 5 pm CT
Fri 8 am - 4 pm CT

sales@custominternet.biz

Sometimes technology can seem a little overwhelming.  There’s always something new to learn!  That’s why once a month we want to share ways you can improve your technology usage – always in a way that’s easy to understand.

Finger touching cloud, lines in sky indicating networking

What Is The Cloud?

The idea of a “Cloud” can be difficult to grasp. I find that it helps to think back to something we’re all more familiar with – the water supply.

Laptop, computer, and extra monitor on desk

How Do I Begin Securing My Systems?

Take stock of the current state of computers, operating systems, network devices (switches, routers, controllers, radios, control systems, etc) WAN links, and other components. This would be a good time to contract with us for a Cybersecurity Assessment so that your network can be evaluated from an impartial perspective.

Woman sitting at desk, working on a laptop computer.

What Do I Look For In A Backup Provider?

Comparing backup providers can be difficult. Here are some things to consider:

Is the backup software easy for your users? Can it run automatically in a ‘hands off’ configuration? If you need to recover, how easily can you do it?

Computer showing blurred-out data, with a cup of coffee and stack of books in the foreground

“I’ve Got Backups So I’m Fine, Right?”

Many times, a small business owner forgets that one of the most valuable items in their business is the data, documents, and other intellectual property created by their employees.  So, by making backups, what you’re really doing is protecting some of the most valuable assets of your business.

Woman sitting at laptop and looking at a credit card as if considering website security

Why Website Security Matters

It can be difficult to understand what goes on behind the scenes of website security. And all those acronyms like TLS, HTTP, JPG, and more don’t make it any simpler. I’d like to help you understand the importance of securing your website.

Old "Sharp" computer keyboard abandoned in a parking garage

How Do I Recycle E-Waste?

Would it surprise you to know that the world’s fastest growing source of garbage is actually e-waste? Learn more about how to recycle e-waste to help keep harmful chemicals and valuable metals out of our landfills!