March 19, 2019
We'repleased to announce that Justin has joined the Avalon Cyber team as a Cyber Security Engineer. Justin will be focused primarily on the technical development of our cybersecurity offerings, inclusive of MDR,threathunting, and incidentresponse.
February 27, 2019
Jonathan has joined the Avalon Cyber team as a Cyber Security Engineer. Jonathan will be focused on our cybersecurity offerings, inclusive of MDR, threat hunting, and cyber incident response process and investigative capabilities.
February 15, 2019
Avalon Cyber is pleased to announce the hiring of Andrew Monaco as Talent Acquisition Specialist. The Avalon team has a passion for solving client challenges and Andrew’s experience with building high-level recruitment strategies will help Avalon engage top talent to meet our client’s needs.
January 8, 2019
After yet another year marked by an excessive amount of high-profile cyber-attacks and data breaches, every company, no matter the size, should now expect to be breached. There is a dangerously unstable balance between the ever-increasing cyber threat and cybersecurity solutions. Increasing threats across industries, and the proliferation of connected endpoints to a myriad of corporate computing...
October 24, 2018
What do some of the world’s most premier data breaches—Target in 2013, Heartland Payment Systems in 2009, Anthem in 2015—have in common?
October 15, 2018
We all have that one friend…the one who hasn’t been to the doctor in 25 years since his parents stopped scheduling appointments for him, the one that says that he’d rather not know what’s wrong with him than find out he has lots of problems, or the one that says he doesn’t need to go because he eats healthy and works out often. If you’re like me and think these people are nuts for not getting a...
September 18, 2018
As a teenager back in the ‘90s, some of my favorite things to do included playing PlayStation and eating pizza. If I were a teenager today, the only difference would be that I’d be playing on my laptop or tablet while eating pizza. Alas, today, I am an adult. And instead of playing games, I’m going to conferences.
August 28, 2018
Just as our devices—computers, phones, tablets—are basically outdated by the time we exit the store, the same is happening for cyberattack protection. Our technology is continually becoming more sophisticated, and cybercriminals are keeping up.
July 24, 2018
Why Antivirus Protection Isn’t Enough. As young students, when we didn’t want someone cheating off of our tests or papers, we put up a folder or Trapper Keeper as a barrier on our desk. This worked great unless someone stood up alleging that they had to use the bathroom. That scoundrel* then had the opportunity to peek over the makeshift boundary.
April 12, 2018
Here at Avalon, we love to see our people move up and take on new challenges. Ryan Lemieux was recently promoted to Information Security Analyst where he will be scrutinizing and providing investigative analysis of cyber events for our clients. Ryan will be the direct point of contact for questions and concerns from Avalon Cyber’s clients and will escalate security events when identified through...
April 6, 2018
Wild Wild West isn’t just a ‘90s hip hop theme song for the movie of the same name, courtesy of Will Smith. It’s also become an internet playground for hackers who are willing to do anything to get into systems, which we’re hearing about on an all-too-regular basis.
Ian Gattie
News,
Kaseya,
MDR,
MSP
April 2, 2018
The General Data Protection Regulation (GDPR), enacted in 2016, becomes effective in May. It requires organizations that handle the personal data of European Union (EU) citizens to ensure adequate protection is in place to prevent theft or misuse.
February 27, 2018
The demand for cybersecurity professionals is outpacing supply, and that’s bad news for your small business.
June 30, 2017
Cybersecurity is looking more and more like a Wile E. Coyote/Road Runner cartoon every day. And sorry to say it, security pros, but we’re the Coyote in this situation.
June 20, 2017
Every day, we read a headline about a computer hacking or hear a personal story about a friend, family member, or colleague getting hacked. The signs of your computer or identity being hacked are often apparent, such as a menacing pop-up screen notifying you that all your critical files have been encrypted and a ransom is demanded to unencrypt them. Other times, though, the signs are subtle and...
June 6, 2017
Did you ever watch The Office and think about how ridiculous it would be to run such a dysfunctional company? Thank goodness you aren’t the CEO of that mess.