Avalon Cybersecurity

October 6, 2021

20 Ways to Block Mobile Attacks

People use their mobile devices for everything these days, including, of course, work. In fact, 60% of an organization’s endpoints are mobile – and unprotected. Since they contain much, if not all, of the same information found on an employee’s corporate laptop or desktop, keeping smart phones, tablets, etc. safe is crucial to the security of your business.
August 9, 2021

Avalon Launches New Phoenix Office

Avalon, a national provider of digital forensics, eDiscovery, cybersecurity, business process outsourcing services, and traditional litigation support services to law firms and corporations, has opened a new office in Phoenix, Arizona. This additional location strengthens Avalon’s national presence and its commitment to assisting the legal and business communities.
July 28, 2021

Avalon Achieves SOC 2 Type 1 Compliance

Avalon is proud to announce that we have successfully completed the SOC 2 Type 1 information security audit as of July 2021. The scope of the audit included our cybersecurity, eDiscovery, and secure print and mail services.
May 7, 2021

Phishing Red Flags

During our most recent webinar, “Into the Dark Web with David Maimon,” (which you can watch at the link) an attendee asked: Is there a list of common email subject lines that are red flags?
March 23, 2021

Avalon Cyber Adds Data Breach Notification to Its List of Services

If you experience a data breach, you probably know that you need to alert your customers as quickly as possible to comply with state and national regulations. But did you know that Avalon Cyber can assist with this?
February 9, 2021

Vulnerability Assessment vs. Penetration Test: What They Are and Why You Need Both

So here's the main difference between vulnerability assessments and penetration tests, put as simply and briefly as possible:
November 18, 2020

Avalon Cyber Partners with KnowBe4

Phishing attacks continue to be one of the biggest cyberthreats faced by businesses around the world – and the COVID-19 pandemic and ensuing chaos have only made the situation more dire. In March 2020, phishing attacks related to coronavirus went up 667% from the previous month. 51% of companies experienced more phishing attacks due to employees working remotely. Even the SANS Institute – a U.S....
February 27, 2020

Ransomware: Pay or Nay?

Ransomware, malicious software that holds your data hostage in exchange for money, is, in a word, terrifying. A bad actor infiltrates your system via a phishing email, for example, encrypts your files, and your business, now crippled, comes to a standstill. The cybercriminal then demands payment, typically in Bitcoin because it’s anonymous and can’t be traced, leaving you in a...
January 27, 2020

"Alex, I'll take cybersecurity for... granted."

I love Jeopardy. But the reality is, I hardly ever watch it. But, when I hear about someone on a hot streak like Ken Jennings or James Holzhauer, I tune in and watch the geniuses clean up.
November 13, 2019

Seven Tips to Help Keep Your Network Safe

As cybercriminals and cyber threats—as well as cybersecurity—all continue to evolve, the list of ways to protect your company could number into the thousands. But for now, to avoid putting you to sleep, we’ve compiled just a few guidelines for protecting your company and your employees.
October 23, 2019

Cybercriminals Never Sleep (And Neither Do We)

According to the latest cybersecurity industry research, market demand for Managed Detection and Response (MDR) services continues to climb. In fact, experts forecast that by 2024, 40% of midsize enterprises will use MDR as their only managed security service. That might sound like a large percentage, but because of the continued escalation of cyberattacks, more and more companies are realizing ...
October 9, 2019

The First 48: You Clicked Through a Phishing Email. Now What?

Most of our daily work routines start out something like this: You stroll into your office building, walk by a few colleagues, give them a wave and a “good morning” with a friendly smile, assuming you got enough sleep the night before. You take a gulp of coffee, log in to your computer, and begin scrolling through Outlook to read and respond to emails.
September 9, 2019

Shielding New Yorkers from Cyberattacks

This July (2019), New York Governor Andrew Cuomo passed the Stop Hacks and Improve Electronic Data Security (SHIELD) Act to further protect state residents from data breaches.
August 7, 2019

Securing Technology: Self-Driving Cars, Nuclear-Tipped Missiles, and Our Obligation to Save the World

First (Really Late) Night at SXSW
July 12, 2019

How Cybersecurity Can Boost Your Business

Did you know that aside from being a preventive measure to curb the multitude of damages caused by a cyberattack, a solid cybersecurity plan can help your business flourish?
May 28, 2019

Public connections are a vector for an adversary to steal your data

Michael McCartney joins Susan Rose and Brian Mazurowski of WBEN to discuss ways to help keep yourself and your data safe while connecting to public WiFi or USB charging stations.
April 26, 2019

A High Volume of Firms Have Been Hacked

Our cybersecurity team has received more than a dozen notifications from local law firms that have had their email accounts compromised in the last two weeks. We feel it is our duty to notify our business community of the recent wave of attacks.
March 20, 2019

Change Your Office 365 Defaults. Today!

Despite the fact that we’re in the business of responding to breaches, I still feel terrible when we get a call that a client has been hacked. It’s the same story most of the time, which is probably two to three times a week. A client calls us panicked because one of their email accounts was compromised and the bad guy is seemingly using the compromised account to hack into the network or use it...
February 15, 2019

Welcome, Andrew Monaco!

Avalon Cyber is pleased to announce the hiring of Andrew Monaco as Talent Acquisition Specialist. The Avalon team has a passion for solving client challenges and Andrew’s experience with building high-level recruitment strategies will help Avalon engage top talent to meet our client’s needs.
January 8, 2019

6 Security Trends Propelling Managed Detection and Response

After yet another year marked by an excessive amount of high-profile cyber-attacks and data breaches, every company, no matter the size, should now expect to be breached. There is a dangerously unstable balance between the ever-increasing cyber threat and cybersecurity solutions. Increasing threats across industries, and the proliferation of connected endpoints to a myriad of corporate computing...
October 24, 2018

Don't Confuse Compliance with Security

What do some of the world’s most premier data breaches—Target in 2013, Heartland Payment Systems in 2009, Anthem in 2015—have in common?
October 15, 2018

Why You and Your Network Should Get an Annual Physical

We all have that one friend…the one who hasn’t been to the doctor in 25 years since his parents stopped scheduling appointments for him, the one that says that he’d rather not know what’s wrong with him than find out he has lots of problems, or the one that says he doesn’t need to go because he eats healthy and works out often. If you’re like me and think these people are nuts for not getting a...
August 28, 2018

Why Endpoint Detection and Response (EDR) is Superior to Your Current Antivirus (AV) Tools

Just as our devices—computers, phones, tablets—are basically outdated by the time we exit the store, the same is happening for cyberattack protection. Our technology is continually becoming more sophisticated, and cybercriminals are keeping up.
July 24, 2018

Cybersecurity Measures That Get a C-

Why Antivirus Protection Isn’t Enough. As young students, when we didn’t want someone cheating off of our tests or papers, we put up a folder or Trapper Keeper as a barrier on our desk. This worked great unless someone stood up alleging that they had to use the bathroom. That scoundrel* then had the opportunity to peek over the makeshift boundary.
April 2, 2018

The EU’s GDPR’s Shockwaves Will Be Felt Across The Atlantic. Are You Ready?

The General Data Protection Regulation (GDPR), enacted in 2016, becomes effective in May. It requires organizations that handle the personal data of European Union (EU) citizens to ensure adequate protection is in place to prevent theft or misuse.
February 27, 2018

There aren’t enough cybersecurity pros to go around. What does this mean for your business?

The demand for cybersecurity professionals is outpacing supply, and that’s bad news for your small business.
June 30, 2017

5 Unexpected Data Security Risks You Need to Address

Cybersecurity is looking more and more like a Wile E. Coyote/Road Runner cartoon every day. And sorry to say it, security pros, but we’re the Coyote in this situation.
June 20, 2017

How Do I Know If I've Been Hacked?

Every day, we read a headline about a computer hacking or hear a personal story about a friend, family member, or colleague getting hacked. The signs of your computer or identity being hacked are often apparent, such as a menacing pop-up screen notifying you that all your critical files have been encrypted and a ransom is demanded to unencrypt them. Other times, though, the signs are subtle and...
June 6, 2017

Cybersecurity Is a CEO Problem Now

Did you ever watch The Office and think about how ridiculous it would be to run such a dysfunctional company? Thank goodness you aren’t the CEO of that mess.

Contact Our Team Now