SERVICES
Cybersecurity Service Plans
Managed Detection & Response (MDR)
Managed Extended Detection & Response (MXDR)
Vulnerability Assessments
Penetration Testing
Incident Response
Incident Response Retainer Program
Data Breach Review
Data Breach Notification
Security Advisory Services
Virtual Chief Information Security Officer (vCISO)
Dark Web Monitoring
Phishing Simulation and Training
WHY AVALON?
RESOURCES
Knowledge Center
Webinars
Blog
In The News
ABOUT
History
Leadership
CONTACT
CAREERS
Service Plans & Pricing
SERVICES
Cybersecurity Service Plans
Managed Detection & Response (MDR)
Managed Extended Detection & Response (MXDR)
Vulnerability Assessments
Penetration Testing
Incident Response
Incident Response Retainer Program
Data Breach Review
Data Breach Notification
Security Advisory Services
Virtual Chief Information Security Officer (vCISO)
Dark Web Monitoring
Phishing Simulation and Training
WHY AVALON?
RESOURCES
Knowledge Center
Webinars
Blog
In The News
ABOUT
History
Leadership
CONTACT
CAREERS
Service Plans & Pricing
Avalon Cybersecurity
New York Department of Financial Services (NYDFS) Amendments Effective November 2024
Risks Lurking in the “Shadows”: Shadow IT and Shadow AI
Focusing In On the New “Govern” Function in NIST CSF 2.0
MS outage linked to CrowdStrike: Falcon Content Update for Windows Hosts
The CDK Incident and Recommended Actions from Avalon Cyber
Avalon Cyber Security Poll Recap: A Deeper Dive into Insider Threats
Get 24/7/365 Protection with Avalon Cyber's Managed Extended Detection & Response (MXDR) Service
Cyber Insurance Considerations for Small and Medium-Sized Businesses
NYDFS Amendment to Cybersecurity Regulation
Governance Considerations in the Age of AI
Does the Silicon Valley Bank Collapse Mean More Cyberattacks?
CISO Spotlight: Jeremy Walczak
Overview of Proposed NIST Cybersecurity Framework Changes
Be Cyber Ready by Implementing These Key Controls
ChatGPT: The Advent of Synthetic Malware
A Quick Guide to Creating Complex Passwords
Introducing Our Cybersecurity Service Plans
Proposed Changes to NYDFS Cybersecurity Requirements
Cybersecurity Spring Cleaning
Get Ready for the New 36-Hour Cyber Breach Notification Rule for Financial Institutions
Planning Ahead to Aid in the Prevention of Cyberattacks
Russian Cyberthreats: Steps to Take to Protect Your Business
Avalon Cyber Welcomes Jill Martucci
Avalon Cyber Launches Incident Response Retainer Program
Cybersecurity Maturity Model Certification (CMMC) Services
The Log4j Vulnerability: Where Do I Start?
92 and Loving It!
Lockbit 2.0 Ransomware Infographic
Why You May Need a Microsoft 365 Best Practices Security Assessment
An Overview of Cybersecurity for Financial Institutions: Looking Back and Planning Ahead
20 Ways to Block Mobile Attacks
Avalon Launches New Phoenix Office
Avalon Achieves SOC 2 Type 1 Compliance
Phishing Red Flags
Avalon Cyber Adds Data Breach Notification to Its List of Services
Vulnerability Assessment vs. Penetration Test: What They Are and Why You Need Both
Avalon Buffalo is on the Move!
Avalon Cyber Partners with KnowBe4
Exciting Changes at Avalon Cyber
Expert Opinion: Brandy Griffin on the Business Email Compromise (BEC)
Citrix Vulnerability Could Allow Attacker to Perform Arbitrary Code Execution
Introducing KnightVision CAM
The Coronavirus's Impact on Cybersecurity
Ransomware: Pay or Nay?
"Alex, I'll take cybersecurity for... granted."
Seven Tips to Help Keep Your Network Safe
Cybercriminals Never Sleep (And Neither Do We)
The RSS:2019 Wrap-Up
The First 48: You Clicked Through a Phishing Email. Now What?
Avalon Comic Series: Gone Phishin' (via Moscow)
Avalon Opens Three New Offices
Team Member Spotlight: Eli Boltz
Shielding New Yorkers from Cyberattacks
Securing Technology: Self-Driving Cars, Nuclear-Tipped Missiles, and Our Obligation to Save the World
How Cybersecurity Can Boost Your Business
Public connections are a vector for an adversary to steal your data
In The News: Michael McCartney
Team Member Spotlight: Brandy Griffin
A High Volume of Firms Have Been Hacked
Change Your Office 365 Defaults. Today!
Meet Justin
Meet Jonathan
Welcome, Andrew Monaco!
6 Security Trends Propelling Managed Detection and Response
Don't Confuse Compliance with Security
Why You and Your Network Should Get an Annual Physical
Hackers Are After...Pizza?
Why Endpoint Detection and Response (EDR) is Superior to Your Current Antivirus (AV) Tools
Cybersecurity Measures That Get a C-
Moving On Up!
The Kaseya Attack: Not Even CPU Cycles Are Safe
The EU’s GDPR’s Shockwaves Will Be Felt Across The Atlantic. Are You Ready?
There aren’t enough cybersecurity pros to go around. What does this mean for your business?
5 Unexpected Data Security Risks You Need to Address
How Do I Know If I've Been Hacked?
Cybersecurity Is a CEO Problem Now
Contact Our Team Now