Category
Mdr

March 3, 2022

Planning Ahead to Aid in the Prevention of Cyberattacks

Most (not all) cyber-related incidents can be avoided through proper planning and by having the right resources in place. Preparation is what makes all the difference, which entails outlining your risks, implementing safeguards to aid in prevention, and knowing who to bring in and when in the event of a cyber incident. After a cyber incident has occurred, time is of the essence to lessen the...
January 10, 2022

Cybersecurity Maturity Model Certification (CMMC) Services

If you’re one of the more than 300,000 companies in the defense industrial base’s (DIB) supply chain, you’re probably familiar with the Department of Defense’s (DoD) Cybersecurity Maturity Model Certification (CMMC). If not, here’s a quick definition courtesy of the Office of the Under Secretary of Defense for Acquisition and Sustainment (OUSD(A&S)): “The CMMC is a framework that includes a...
September 28, 2020

Expert Opinion: Brandy Griffin on the Business Email Compromise (BEC)

In this blog, Brandy Griffin, Cyber Service Delivery Manager for Avalon Cyber, discusses the business email compromise (BEC), what you can do to help prevent one from affecting your organization, and how to respond if a BEC occurs.
March 18, 2020

The Coronavirus's Impact on Cybersecurity

We’re hearing a lot about protecting ourselves during the COVID-19 pandemic. Unfortunately, cybercriminals are using the opportunity to create sophisticated social engineering campaigns and scaling up criminal activity, which means we need to work even harder to protect our online assets too.
November 13, 2019

Seven Tips to Help Keep Your Network Safe

As cybercriminals and cyber threats—as well as cybersecurity—all continue to evolve, the list of ways to protect your company could number into the thousands. But for now, to avoid putting you to sleep, we’ve compiled just a few guidelines for protecting your company and your employees.
October 23, 2019

Cybercriminals Never Sleep (And Neither Do We)

According to the latest cybersecurity industry research, market demand for Managed Detection and Response (MDR) services continues to climb. In fact, experts forecast that by 2024, 40% of midsize enterprises will use MDR as their only managed security service. That might sound like a large percentage, but because of the continued escalation of cyberattacks, more and more companies are realizing ...
July 12, 2019

How Cybersecurity Can Boost Your Business

Did you know that aside from being a preventive measure to curb the multitude of damages caused by a cyberattack, a solid cybersecurity plan can help your business flourish?
May 28, 2019

Public connections are a vector for an adversary to steal your data

Michael McCartney joins Susan Rose and Brian Mazurowski of WBEN to discuss ways to help keep yourself and your data safe while connecting to public WiFi or USB charging stations.
May 17, 2019

In The News: Michael McCartney

Michael McCartney, president of Avalon Cyber, was interviewed by Randy Bushover of WBEN for the Buffalo Means Business Radio Show. Michael talks cybersecurity and gives advice on what to do to help to mitigate the risk of a cyber attack.
January 8, 2019

6 Security Trends Propelling Managed Detection and Response

After yet another year marked by an excessive amount of high-profile cyber-attacks and data breaches, every company, no matter the size, should now expect to be breached. There is a dangerously unstable balance between the ever-increasing cyber threat and cybersecurity solutions. Increasing threats across industries, and the proliferation of connected endpoints to a myriad of corporate computing...
August 28, 2018

Why Endpoint Detection and Response (EDR) is Superior to Your Current Antivirus (AV) Tools

Just as our devices—computers, phones, tablets—are basically outdated by the time we exit the store, the same is happening for cyberattack protection. Our technology is continually becoming more sophisticated, and cybercriminals are keeping up.
July 24, 2018

Cybersecurity Measures That Get a C-

Why Antivirus Protection Isn’t Enough. As young students, when we didn’t want someone cheating off of our tests or papers, we put up a folder or Trapper Keeper as a barrier on our desk. This worked great unless someone stood up alleging that they had to use the bathroom. That scoundrel* then had the opportunity to peek over the makeshift boundary.
April 6, 2018

The Kaseya Attack: Not Even CPU Cycles Are Safe

Wild Wild West isn’t just a ‘90s hip hop theme song for the movie of the same name, courtesy of Will Smith. It’s also become an internet playground for hackers who are willing to do anything to get into systems, which we’re hearing about on an all-too-regular basis.

Contact Our Team Now