Logo: Practical Cybersecurity

Webinar Series

2nd Thursday of Every Month @ 10:30 AM

Next Topic

Preparing for Ransomware

Providing Solutions That Work Since 2003!

104 1/2 W 9th Ave Suite 500
Winfield, KS 67156

Mon - Thurs 8 am - 5 pm CT
Fri 8 am - 4 pm CT

sales@custominternet.biz

Mobile Malware Has Increased 500% – What Should You Do?

Man standing on street corner checking his mobile device

Cybersecurity researchers uncovered an alarming mobile statistic. During the first few months of 2022, mobile malware attacks surged by 500%. It’s time to start thinking about your smartphone as a mini-computer and keeping it just as secure.

What to Include in a Year-End Technology Infrastructure Review

Business employees meeting to discuss year-end technology infrastructure review

When the year is coming to a close, it’s the perfect time to plan for the future. Most businesses begin the year with the hope of growing and improving operations. Much of how a business operates depends on technology. So, it makes sense to look to your IT for areas of optimization.

8 Tech Checks to Make Before You Travel

Woman standing at airport with suitcase, checking smartphone

Travel smarter and more securely by doing several checks before you go. Use our handy tech travel checklist. It can save you from suffering from lost devices, missing chargers, or a data breach.

What Does That Little Padlock Really Mean?

Chrome web browser showing little padlock in url bar

That little padlock in our browser bar – we’ve all see it while shopping online and have been warned by our banks to look for it. But what does that little padlock really mean?

“I’ve Got Backups So I’m Fine, Right?”

Computer showing blurred-out data, with a cup of coffee and stack of books in the foreground

Many times, a small business owner forgets that one of the most valuable items in their business is the data, documents, and other intellectual property created by their employees.  So, by making backups, what you’re really doing is protecting some of the most valuable assets of your business.

What Can Happen If My Network Is Breached?

Man sitting on couch with glasses in his hand and fingers pressed to his temples

There are many possible consequences that could result from a breach of your network or data. Here is a partial list of some of the consequences if your network is breached.

What Do Attackers Want?

Man in dark hoodie hunched over laptop

The ways in which an attacker can profit from accessing your network are almost endless. All it takes is a little imagination to figure out possible ways to gain from being on your network.

What Devices Are Under Attack?

Desktop computer, laptop computer, and tablet sitting on a desk

If you have an electronic device that either has an IP address or somehow communicates with another electronic device, then you have something that can potentially be hacked. And if it can potentially be hacked, then it has to be secured.

How Can Attackers Get In My Network?

Woman in distress, sitting in front of open laptop with her face in her hands

There are lots of ways for an attacker to get into your network, but several common ways are used over and over by bad guys. Let’s briefly review the most common entry points.