May 28, 2024
Earlier this month, Avalon Cyber posted a poll on LinkedIn asking, “What cybersecurity threat keeps you up at night?” The choices were: external threat (for example, ransomware), internal threat (i.e., IP theft), or the birth of GenAI.
October 5, 2022
Developing – and maturing – a layered, effective cybersecurity program for your organization can be confusing, time-consuming, and stressful. But it doesn’t have to be.
April 11, 2022
The weather is changing, and spring is upon us. Each year around this time, many people tend to do a thorough cleaning of their home and maybe tackle a few home improvement projects before summer arrives. We cannot forget to do the same maintenance and enhancements to our cybersecurity program. To assist you, we created this basic cybersecurity “to-do” list to ensure that you are being proactive...
March 3, 2022
Most (not all) cyber-related incidents can be avoided through proper planning and by having the right resources in place. Preparation is what makes all the difference, which entails outlining your risks, implementing safeguards to aid in prevention, and knowing who to bring in and when in the event of a cyber incident. After a cyber incident has occurred, time is of the essence to lessen the...
January 10, 2022
If you’re one of the more than 300,000 companies in the defense industrial base’s (DIB) supply chain, you’re probably familiar with the Department of Defense’s (DoD) Cybersecurity Maturity Model Certification (CMMC). If not, here’s a quick definition courtesy of the Office of the Under Secretary of Defense for Acquisition and Sustainment (OUSD(A&S)): “The CMMC is a framework that includes a...
December 16, 2021
If you’ve made it past the title, you already know what we’re talking about, and I hope you don’t stop here because you’re afraid of just another technical brain dump of how bad Log4j (aka Log4shell) actually is. What I think will be more impactful for our readers is to provide you with information on:
October 15, 2021
Cyber risk, the probability of loss and/or harm to an entity based on technological exposures, is much higher in the financial industry as compared to others, to the extent that even bank ratings can be greatly impacted. This certainly isn’t surprising given the nature of the data this sector manages every day.
February 9, 2021
So here's the main difference between vulnerability assessments and penetration tests, put as simply and briefly as possible:
September 28, 2020
In this blog, Brandy Griffin, Cyber Service Delivery Manager for Avalon Cyber, discusses the business email compromise (BEC), what you can do to help prevent one from affecting your organization, and how to respond if a BEC occurs.
March 18, 2020
We’re hearing a lot about protecting ourselves during the COVID-19 pandemic. Unfortunately, cybercriminals are using the opportunity to create sophisticated social engineering campaigns and scaling up criminal activity, which means we need to work even harder to protect our online assets too.
November 13, 2019
As cybercriminals and cyber threats—as well as cybersecurity—all continue to evolve, the list of ways to protect your company could number into the thousands. But for now, to avoid putting you to sleep, we’ve compiled just a few guidelines for protecting your company and your employees.
July 12, 2019
Did you know that aside from being a preventive measure to curb the multitude of damages caused by a cyberattack, a solid cybersecurity plan can help your business flourish?
October 24, 2018
What do some of the world’s most premier data breaches—Target in 2013, Heartland Payment Systems in 2009, Anthem in 2015—have in common?