May 7, 2021
During our most recent webinar, “Into the Dark Web with David Maimon,” (which you can watch at the link) an attendee asked: Is there a list of common email subject lines that are red flags?
March 23, 2021
If you experience a data breach, you probably know that you need to alert your customers as quickly as possible to comply with state and national regulations. But did you know that Avalon Cyber can assist with this?
February 9, 2021
So here's the main difference between vulnerability assessments and penetration tests, put as simply and briefly as possible:
November 10, 2020
Avalon has been on a consistent growth trajectory for many years, expanding our geographic reach and our suite of services to meet the everchanging needs of our clients. To this end, we recently made some exciting changes within the Avalon Cyber division, including creating new positions for current team members and bringing a new hire aboard. This alignment will better position each of our...
September 28, 2020
In this blog, Brandy Griffin, Cyber Service Delivery Manager for Avalon Cyber, discusses the business email compromise (BEC), what you can do to help prevent one from affecting your organization, and how to respond if a BEC occurs.
April 10, 2020
In this challenging time, and with many companies moving to remote workforces, we would like to share some important information concerning a vulnerability in Citrix, as many companies utilize this tool to allow their remote workforce to connect to corporate networks and resources.
August 28, 2018
Just as our devices—computers, phones, tablets—are basically outdated by the time we exit the store, the same is happening for cyberattack protection. Our technology is continually becoming more sophisticated, and cybercriminals are keeping up.
July 24, 2018
Why Antivirus Protection Isn’t Enough. As young students, when we didn’t want someone cheating off of our tests or papers, we put up a folder or Trapper Keeper as a barrier on our desk. This worked great unless someone stood up alleging that they had to use the bathroom. That scoundrel* then had the opportunity to peek over the makeshift boundary.
June 20, 2017
Every day, we read a headline about a computer hacking or hear a personal story about a friend, family member, or colleague getting hacked. The signs of your computer or identity being hacked are often apparent, such as a menacing pop-up screen notifying you that all your critical files have been encrypted and a ransom is demanded to unencrypt them. Other times, though, the signs are subtle and...