October 6, 2021
People use their mobile devices for everything these days, including, of course, work. In fact, 60% of an organization’s endpoints are mobile – and unprotected. Since they contain much, if not all, of the same information found on an employee’s corporate laptop or desktop, keeping smart phones, tablets, etc. safe is crucial to the security of your business.
August 9, 2021
Avalon, a national provider of digital forensics, eDiscovery, cybersecurity, business process outsourcing services, and traditional litigation support services to law firms and corporations, has opened a new office in Phoenix, Arizona. This additional location strengthens Avalon’s national presence and its commitment to assisting the legal and business communities.
July 28, 2021
Avalon is proud to announce that we have successfully completed the SOC 2 Type 1 information security audit as of July 2021. The scope of the audit included our cybersecurity, eDiscovery, and secure print and mail services.
May 7, 2021
During our most recent webinar, “Into the Dark Web with David Maimon,” (which you can watch at the link) an attendee asked: Is there a list of common email subject lines that are red flags?
March 23, 2021
If you experience a data breach, you probably know that you need to alert your customers as quickly as possible to comply with state and national regulations. But did you know that Avalon Cyber can assist with this?
February 9, 2021
So here's the main difference between vulnerability assessments and penetration tests, put as simply and briefly as possible:
November 18, 2020
Phishing attacks continue to be one of the biggest cyberthreats faced by businesses around the world – and the COVID-19 pandemic and ensuing chaos have only made the situation more dire. In March 2020, phishing attacks related to coronavirus went up 667% from the previous month. 51% of companies experienced more phishing attacks due to employees working remotely. Even the SANS Institute – a U.S....
February 27, 2020
Ransomware, malicious software that holds your data hostage in exchange for money, is, in a word, terrifying. A bad actor infiltrates your system via a phishing email, for example, encrypts your files, and your business, now crippled, comes to a standstill. The cybercriminal then demands payment, typically in Bitcoin because it’s anonymous and can’t be traced, leaving you in a...
January 27, 2020
I love Jeopardy. But the reality is, I hardly ever watch it. But, when I hear about someone on a hot streak like Ken Jennings or James Holzhauer, I tune in and watch the geniuses clean up.
November 13, 2019
As cybercriminals and cyber threats—as well as cybersecurity—all continue to evolve, the list of ways to protect your company could number into the thousands. But for now, to avoid putting you to sleep, we’ve compiled just a few guidelines for protecting your company and your employees.
October 23, 2019
According to the latest cybersecurity industry research, market demand for Managed Detection and Response (MDR) services continues to climb. In fact, experts forecast that by 2024, 40% of midsize enterprises will use MDR as their only managed security service. That might sound like a large percentage, but because of the continued escalation of cyberattacks, more and more companies are realizing ...
October 9, 2019
Most of our daily work routines start out something like this: You stroll into your office building, walk by a few colleagues, give them a wave and a “good morning” with a friendly smile, assuming you got enough sleep the night before. You take a gulp of coffee, log in to your computer, and begin scrolling through Outlook to read and respond to emails.
September 9, 2019
This July (2019), New York Governor Andrew Cuomo passed the Stop Hacks and Improve Electronic Data Security (SHIELD) Act to further protect state residents from data breaches.
August 7, 2019
First (Really Late) Night at SXSW
July 12, 2019
Did you know that aside from being a preventive measure to curb the multitude of damages caused by a cyberattack, a solid cybersecurity plan can help your business flourish?
May 28, 2019
Michael McCartney joins Susan Rose and Brian Mazurowski of WBEN to discuss ways to help keep yourself and your data safe while connecting to public WiFi or USB charging stations.
April 26, 2019
Our cybersecurity team has received more than a dozen notifications from local law firms that have had their email accounts compromised in the last two weeks. We feel it is our duty to notify our business community of the recent wave of attacks.
March 20, 2019
Despite the fact that we’re in the business of responding to breaches, I still feel terrible when we get a call that a client has been hacked. It’s the same story most of the time, which is probably two to three times a week. A client calls us panicked because one of their email accounts was compromised and the bad guy is seemingly using the compromised account to hack into the network or use it...
February 15, 2019
Avalon Cyber is pleased to announce the hiring of Andrew Monaco as Talent Acquisition Specialist. The Avalon team has a passion for solving client challenges and Andrew’s experience with building high-level recruitment strategies will help Avalon engage top talent to meet our client’s needs.
January 8, 2019
After yet another year marked by an excessive amount of high-profile cyber-attacks and data breaches, every company, no matter the size, should now expect to be breached. There is a dangerously unstable balance between the ever-increasing cyber threat and cybersecurity solutions. Increasing threats across industries, and the proliferation of connected endpoints to a myriad of corporate computing...
October 24, 2018
What do some of the world’s most premier data breaches—Target in 2013, Heartland Payment Systems in 2009, Anthem in 2015—have in common?
October 15, 2018
We all have that one friend…the one who hasn’t been to the doctor in 25 years since his parents stopped scheduling appointments for him, the one that says that he’d rather not know what’s wrong with him than find out he has lots of problems, or the one that says he doesn’t need to go because he eats healthy and works out often. If you’re like me and think these people are nuts for not getting a...
August 28, 2018
Just as our devices—computers, phones, tablets—are basically outdated by the time we exit the store, the same is happening for cyberattack protection. Our technology is continually becoming more sophisticated, and cybercriminals are keeping up.
July 24, 2018
Why Antivirus Protection Isn’t Enough. As young students, when we didn’t want someone cheating off of our tests or papers, we put up a folder or Trapper Keeper as a barrier on our desk. This worked great unless someone stood up alleging that they had to use the bathroom. That scoundrel* then had the opportunity to peek over the makeshift boundary.
April 2, 2018
The General Data Protection Regulation (GDPR), enacted in 2016, becomes effective in May. It requires organizations that handle the personal data of European Union (EU) citizens to ensure adequate protection is in place to prevent theft or misuse.
February 27, 2018
The demand for cybersecurity professionals is outpacing supply, and that’s bad news for your small business.
June 30, 2017
Cybersecurity is looking more and more like a Wile E. Coyote/Road Runner cartoon every day. And sorry to say it, security pros, but we’re the Coyote in this situation.
June 20, 2017
Every day, we read a headline about a computer hacking or hear a personal story about a friend, family member, or colleague getting hacked. The signs of your computer or identity being hacked are often apparent, such as a menacing pop-up screen notifying you that all your critical files have been encrypted and a ransom is demanded to unencrypt them. Other times, though, the signs are subtle and...
June 6, 2017
Did you ever watch The Office and think about how ridiculous it would be to run such a dysfunctional company? Thank goodness you aren’t the CEO of that mess.