Category
Cybersecurity

May 7, 2021

Phishing Red Flags

During our most recent webinar, “Into the Dark Web with David Maimon,” (which you can watch at the link) an attendee asked: Is there a list of common email subject lines that are red flags?
March 23, 2021

Avalon Cyber Adds Data Breach Notification to Its List of Services

If you experience a data breach, you probably know that you need to alert your customers as quickly as possible to comply with state and national regulations. But did you know that Avalon Cyber can assist with this?
February 9, 2021

Vulnerability Assessment vs. Penetration Test: What They Are and Why You Need Both

So here's the main difference between vulnerability assessments and penetration tests, put as simply and briefly as possible:
November 10, 2020

Exciting Changes at Avalon Cyber

Avalon has been on a consistent growth trajectory for many years, expanding our geographic reach and our suite of services to meet the everchanging needs of our clients. To this end, we recently made some exciting changes within the Avalon Cyber division, including creating new positions for current team members and bringing a new hire aboard. This alignment will better position each of our...
September 28, 2020

Expert Opinion: Brandy Griffin on the Business Email Compromise (BEC)

In this blog, Brandy Griffin, Cyber Service Delivery Manager for Avalon Cyber, discusses the business email compromise (BEC), what you can do to help prevent one from affecting your organization, and how to respond if a BEC occurs.
April 10, 2020

Citrix Vulnerability Could Allow Attacker to Perform Arbitrary Code Execution

In this challenging time, and with many companies moving to remote workforces, we would like to share some important information concerning a vulnerability in Citrix, as many companies utilize this tool to allow their remote workforce to connect to corporate networks and resources.
August 28, 2018

Why Endpoint Detection and Response (EDR) is Superior to Your Current Antivirus (AV) Tools

Just as our devices—computers, phones, tablets—are basically outdated by the time we exit the store, the same is happening for cyberattack protection. Our technology is continually becoming more sophisticated, and cybercriminals are keeping up.
July 24, 2018

Cybersecurity Measures That Get a C-

Why Antivirus Protection Isn’t Enough. As young students, when we didn’t want someone cheating off of our tests or papers, we put up a folder or Trapper Keeper as a barrier on our desk. This worked great unless someone stood up alleging that they had to use the bathroom. That scoundrel* then had the opportunity to peek over the makeshift boundary.
June 20, 2017

How Do I Know If I've Been Hacked?

Every day, we read a headline about a computer hacking or hear a personal story about a friend, family member, or colleague getting hacked. The signs of your computer or identity being hacked are often apparent, such as a menacing pop-up screen notifying you that all your critical files have been encrypted and a ransom is demanded to unencrypt them. Other times, though, the signs are subtle and...

Contact Our Team Now