Category
Penetration-testing

April 11, 2022

Cybersecurity Spring Cleaning

The weather is changing, and spring is upon us. Each year around this time, many people tend to do a thorough cleaning of their home and maybe tackle a few home improvement projects before summer arrives. We cannot forget to do the same maintenance and enhancements to our cybersecurity program. To assist you, we created this basic cybersecurity “to-do” list to ensure that you are being proactive...
March 3, 2022

Planning Ahead to Aid in the Prevention of Cyberattacks

Most (not all) cyber-related incidents can be avoided through proper planning and by having the right resources in place. Preparation is what makes all the difference, which entails outlining your risks, implementing safeguards to aid in prevention, and knowing who to bring in and when in the event of a cyber incident. After a cyber incident has occurred, time is of the essence to lessen the...
January 10, 2022

Cybersecurity Maturity Model Certification (CMMC) Services

If you’re one of the more than 300,000 companies in the defense industrial base’s (DIB) supply chain, you’re probably familiar with the Department of Defense’s (DoD) Cybersecurity Maturity Model Certification (CMMC). If not, here’s a quick definition courtesy of the Office of the Under Secretary of Defense for Acquisition and Sustainment (OUSD(A&S)): “The CMMC is a framework that includes a...
December 16, 2021

The Log4j Vulnerability: Where Do I Start?

If you’ve made it past the title, you already know what we’re talking about, and I hope you don’t stop here because you’re afraid of just another technical brain dump of how bad Log4j (aka Log4shell) actually is. What I think will be more impactful for our readers is to provide you with information on:
October 15, 2021

An Overview of Cybersecurity for Financial Institutions: Looking Back and Planning Ahead

Cyber risk, the probability of loss and/or harm to an entity based on technological exposures, is much higher in the financial industry as compared to others, to the extent that even bank ratings can be greatly impacted. This certainly isn’t surprising given the nature of the data this sector manages every day.
February 9, 2021

Vulnerability Assessment vs. Penetration Test: What They Are and Why You Need Both

So here's the main difference between vulnerability assessments and penetration tests, put as simply and briefly as possible:
September 28, 2020

Expert Opinion: Brandy Griffin on the Business Email Compromise (BEC)

In this blog, Brandy Griffin, Cyber Service Delivery Manager for Avalon Cyber, discusses the business email compromise (BEC), what you can do to help prevent one from affecting your organization, and how to respond if a BEC occurs.
March 18, 2020

The Coronavirus's Impact on Cybersecurity

We’re hearing a lot about protecting ourselves during the COVID-19 pandemic. Unfortunately, cybercriminals are using the opportunity to create sophisticated social engineering campaigns and scaling up criminal activity, which means we need to work even harder to protect our online assets too.
November 13, 2019

Seven Tips to Help Keep Your Network Safe

As cybercriminals and cyber threats—as well as cybersecurity—all continue to evolve, the list of ways to protect your company could number into the thousands. But for now, to avoid putting you to sleep, we’ve compiled just a few guidelines for protecting your company and your employees.
July 12, 2019

How Cybersecurity Can Boost Your Business

Did you know that aside from being a preventive measure to curb the multitude of damages caused by a cyberattack, a solid cybersecurity plan can help your business flourish?
October 24, 2018

The Cybersecurity Trap: Don't Confuse Compliance with Security

What do some of the world’s most premier data breaches—Target in 2013, Heartland Payment Systems in 2009, Anthem in 2015—have in common?
Content not found