- Advisory Services
- Auditing
- Business Continuity
- Compliance
- Cyber Showcase
- Cybersecurity Testing
- Hacker Hour
- Hardening
- Incident Response
- Network Security
- Penetration Testing
- Press Release
- Ransomware
- Risk Management
- SBS Institute
- Security Awareness Training
- Threat Advisory
- TRAC
- vCISO
- Vendor Management
- Webinar
Enhance Your Microsoft 365 Security with Our Best Practices Checklist
Explore our essential security best practices for Microsoft 365 and Office 365 to safeguard your data. Download our checklist for effective risk mitigation.
The New R-Sat: Changes in Latitudes, Changes in Attitudes
Discover the latest Ransomware Self-Assessment updates while exploring the fascinating connection between Jimmy Buffet and our inner Parrot Heads.
SBS Institute: Defending Your Business Against Business Email Compromise
Learn how to prevent Business Email Compromise (BEC) attacks and safeguard your organization from data breaches and network compromises.
Hacker Hour: How Bad Guys Bypass MFA
Discover the techniques used by cybercriminals to bypass MFA. Join SBS Cyber's Hacker Hour to learn about MFA vulnerabilities and how to protect against them.
Hacker Hour: M365 Email Account Compromise Triage
Watch our Hacker Hour webinar to learn crucial strategies for responding to email account compromises in the Microsoft 365 environment.
MFA Fatigue - Improving the Second Factor
As MFA gains popularity, attackers adjust tactics to target organizations. MFA combines knowledge, possession, and identity for authentication, but human-related security flaws remain a concern.
Quick Tip to Keep Hackers Out - Always Verify MFA
Discover the significance of multi-factor authentication, an exceptional security measure, while acknowledging its vulnerability: the user.
Hacker Hour: Microsoft 365 Security Defaults & Best Practices
Boost your Microsoft 365 security with expert tips on security defaults & best practices. Discover how to protect your data & optimize security on our webinar.
Risks of Granting Local Admin Rights to Users
Understand the risks of granting local admin rights to users and best practices to secure your systems and prevent unauthorized access.
How the Cyber Kill Chain Can Help You Protect Against Attacks
Discover how the Cyber Kill Chain aids in crafting robust defense strategies against the Advanced Persistent Threat, mapping controls to seven crucial attack stages.