104 1/2 W 9th Ave Suite 500

Winfield, KS 67156

Mon - Thurs 8 am - 5 pm CT

Fri 8 am - 4 pm CT

support@custominternet.biz

Logo for Custom Internet Services LLC

104 1/2 W 9th Ave Suite 500

Winfield, KS 67156

Mon - Thurs 8 am - 5 pm CT

Fri 8 am - 4 pm CT

support@custominternet.biz

104 1/2 W 9th Ave Suite 500

Winfield, KS 67156

Mon - Thurs 8 am - 5 pm CT

Fri 8 am - 4 pm CT

support@custominternet.biz

The Support You Need, How You Need It!

Customer Portal

Already a client of ours? Please contact us for your Login Credentials and start tracking your Support today!

Share Your Screen

Need to share your screen with us for extra help? Click above when your support tech tells you to.

Visit Us In Person Or Call Us

104 1/2 W 9th, Suite 500
Winfield, KS 67156
(620) 221-3614

Contact Us

Have a question for us? Click the envelope and fill out our form. We will get back to you as soon as possible.

White Horse Domains Support

Click the horse above to see FAQ of our White Horse Domains products.
Or call (480) 624-2500 for 24/7 Support

Customer Portal

Already a client of ours? Please contact us for your Login Credentials and start tracking your Support today!

Share Your Screen

Need to share your screen with us for extra help? Click above when your support tech tells you to.

Visit Us In Person Or Call Us

104 1/2 W 9th, Suite 500
Winfield, KS 67156
(620) 221-3614

Contact Us

Have a question for us? Click the envelope and fill out our form. We will get back to you as soon as possible.

White Horse Domains Support

Click the horse above to see an FAQ of our White Horse Domains products.
Or call (480) 624-2500 for 24/7 Support

FAQ About Our Services

Cybersecurity

Yes. People all around the world are actively trying to breach or damage your networks.

Networks, Data, Emails, Operating Systems, Applications, Servers, Client Computers, Mobile Devices, Wireless Access Points, Routers, Switches, and other Controllers, backups, and the list goes on!

Take stock of the current state of computers, operating systems, network devices (switches, routers, controllers, radios, control systems, etc) WAN links, and other components. This would be a good time to contract with us for a Cybersecurity Assessment so that your network can be evaluated from an impartial perspective.

Custom Internet Services has the expertise to help your organization progress down the road towards better Cybersecurity. We can help you and your business implement the areas appropriate to your situation.  Specifically, we can address the following issues for your business :

  1. Cybersecurity Assessment
  2. Cybersecurity Planning & Implementation
  3. Cybersecurity Training
  4. Incident Recovery Evaluation
  5. Incident Recovery Pre-Planning
  6. Incident Response

Find out more here.

Networking

There are generally five types of bad actors.

  • First are people who are simply mischievous.
  • Second are those looking for criminal or financial gain.
  • Third are nation states attempting to gain a strategic advantage.
  • Fourth are the ‘hacktivists’ who do hacking in support of a cause.
  • And fifth are those who simply want to destroy stuff.

As you can imagine, there are plenty of people who want into your network.

We often think of bank or credit account information as valuable, and it is. But a computer with network access is by itself valuable. A bad actor can use your computer as a launch point to attack someone else, pivot from your computer into another network, or ‘rent’ your compromised computer to someone else for criminal use (all without your knowledge).

Yes. Besides stealing personally identifiable information (PII), hackers can damage physical infrastructure, corrupt data files, and pivot from one device to another across the network. Hackers can also use your network as a launch point for attacks against others. But damage to your network is only the start of potential consequences.

Read more in our article, “Do You Have A Plan In Place To Guard Your Networks?”

Besides the loss of public confidence when the breach becomes known and the monetary costs associated with containing the damage, the network owner may also be legally liable if the hacked network is used for illegal activity or as a launch point to attack others. We’re also seeing lawsuits from people who had their information stolen against companies who’s networks have been hacked. This will likely only increase.

Data Protection & Recovery

Disaster recovery is the ability to continue work after a catastrophic event.  This includes a crippling computer virus, hardware malfunction or even a natural disaster such as a fire or a flood.  Disaster Recovery differs from Data Backup–simply having a copy of your data is insufficient to get your business back up and running should something happen.

The odds of something happening to your data are high.  The costs of restoring your system are even higher.  According to the National Computer Security Association, without having an adequate backup solution in place it takes:

  • 19 days and $17,000 to recreate just 20 MB of lost sales/marketing data
  • 21 days and $19,000 to recreate just 20 MB of lost accounting data
  • 42 days and $98,000 to recreate just 20 MB of lost engineering data

People are often amazed at the variety of data that needs backed up and protected. While not an exhaustive list, you will likely find that you need to backup these types of data –

  • Email archives or Exchange data stores
  • Laptop/Desktop files
  • Network device configuration files
  • Tablet/Mobile device documents
  • Documents stored in cloud services
  • Databases
  • SharePoint files.
  • Virtual Machines
  • Server/Laptop system images
  • Photos

The top things to look at include :

  1. Certified Data Centers
  2. Encryption
  3. Easy To Use
  4. Versioning
  5. Ease Of Recovery

Find more things to look for in our article “Protect Your Data to Protect Your Business”

Cybersecurity

Yes. People all around the world are actively trying to breach or damage your networks.

Networks, Data, Emails, Operating Systems, Applications, Servers, Client Computers, Mobile Devices, Wireless Access Points, Routers, Switches, and other Controllers, backups, and the list goes on!

Take stock of the current state of computers, operating systems, network devices (switches, routers, controllers, radios, control systems, etc) WAN links, and other components. This would be a good time to contract with us for a Cybersecurity Assessment so that your network can be evaluated from an impartial perspective.

Custom Internet Services has the expertise to help your organization progress down the road towards better Cybersecurity. We can help you and your business implement the areas appropriate to your situation.  Specifically, we can address the following issues for your business :

  1. Cybersecurity Assessment
  2. Cybersecurity Planning & Implementation
  3. Cybersecurity Training
  4. Incident Recovery Evaluation
  5. Incident Recovery Pre-Planning
  6. Incident Response

Find out more here.

Networking

There are generally five types of bad actors.

  • First are people who are simply mischievous.
  • Second are those looking for criminal or financial gain.
  • Third are nation states attempting to gain a strategic advantage.
  • Fourth are the ‘hacktivists’ who do hacking in support of a cause.
  • And fifth are those who simply want to destroy stuff.

As you can imagine, there are plenty of people who want into your network.

We often think of bank or credit account information as valuable, and it is. But a computer with network access is by itself valuable. A bad actor can use your computer as a launch point to attack someone else, pivot from your computer into another network, or ‘rent’ your compromised computer to someone else for criminal use (all without your knowledge).

Yes. Besides stealing personally identifiable information (PII), hackers can damage physical infrastructure, corrupt data files, and pivot from one device to another across the network. Hackers can also use your network as a launch point for attacks against others. But damage to your network is only the start of potential consequences.

Read more in our article, “Do You Have A Plan In Place To Guard Your Networks?”

Besides the loss of public confidence when the breach becomes known and the monetary costs associated with containing the damage, the network owner may also be legally liable if the hacked network is used for illegal activity or as a launch point to attack others. We’re also seeing lawsuits from people who had their information stolen against companies who’s networks have been hacked. This will likely only increase.

Data Protection & Recovery

Disaster recovery is the ability to continue work after a catastrophic event.  This includes a crippling computer virus, hardware malfunction or even a natural disaster such as a fire or a flood.  Disaster Recovery differs from Data Backup–simply having a copy of your data is insufficient to get your business back up and running should something happen.

The odds of something happening to your data are high.  The costs of restoring your system are even higher.  According to the National Computer Security Association, without having an adequate backup solution in place it takes:

  • 19 days and $17,000 to recreate just 20 MB of lost sales/marketing data
  • 21 days and $19,000 to recreate just 20 MB of lost accounting data
  • 42 days and $98,000 to recreate just 20 MB of lost engineering data

People are often amazed at the variety of data that needs backed up and protected. While not an exhaustive list, you will likely find that you need to backup these types of data –

  • Email archives or Exchange data stores
  • Laptop/Desktop files
  • Network device configuration files
  • Tablet/Mobile device documents
  • Documents stored in cloud services
  • Databases
  • SharePoint files.
  • Virtual Machines
  • Server/Laptop system images
  • Photos

The top things to look at include :

  1. Certified Data Centers
  2. Encryption
  3. Easy To Use
  4. Versioning
  5. Ease Of Recovery

Find more things to look for in our article “Protect Your Data to Protect Your Business”

Website Design

Your website is to the web what your storefront is to foot-traffic.  It is where people can find you, your products and information about your business.  

You would need your contact information, business details, products (if you sell them). Make your website fit your business and customer needs.

Visit our Website Design page to find tips for everyone from Do-It-Yourself types to the ones that want to be hands off and have us do the work for you.

  1. Use your business name.
  2. Be careful using numbers, symbols, or creative spellings.
  3. Keep it simple.
  4. If you are still unsure about choosing a domain name, discuss your options with our web developers during your initial meeting.

Social Media Management

Just like finding your storefront, customers need to be able to easily find you online.  Search Engines like Bing and Google are able to offer users search results based on their current location. If you do not have a web presence you could be missing out on customers.

  1. Do a search for your business on your website and see what you find.
  2. Use the Contact Form above to setup a time for us to do this for you.

If your information for your business is not up-to-date then you run the risk of missing business opportunities.  Make sure potential customers know how to contact you and when to contact you, so you don’t miss opportunities.

Depending on the Social Media Platform the amount of times you should post and when will vary. If you feel that your time is already stretched to far, contact us and ask how we can help you.