By

Ian Gattie
cybersecurity pro with tablet in server room
What do some of the world’s most premier data breaches—Target in 2013, Heartland Payment Systems in 2009, Anthem in 2015—have in common? In these examples (and so many more), the companies had actually met compliance requirements before the breach occurred. Whether it was PCI DSS or HIPAA, one thing became clear in the aftermath—regulatory compliance...
Read More
cybersecurity expert on computer
Why Endpoint Detection and Response (EDR) is Superior to Your Current Antivirus (AV) Tools  Just as our devices—computers, phones, tablets—are basically outdated by the time we exit the store, the same is happening for cyberattack protection. Our technology is continually becoming more sophisticated, and cybercriminals are keeping up. As we mentioned in a previous post,...
Read More
man hiding behind folder
Why Antivirus Protection Isn’t Enough. As young students, when we didn’t want someone cheating off of our tests or papers, we put up a folder or Trapper Keeper as a barrier on our desk. This worked great unless someone stood up alleging that they had to use the bathroom. That scoundrel* then had the opportunity...
Read More
Ryan Lemieux, Avalon Cyber information security analyst
Here at Avalon, we love to see our people move up and take on new challenges. Ryan Lemieux was recently promoted to Information Security Analyst where he will be scrutinizing and providing investigative analysis of cyber events for our clients. Ryan will be the direct point of contact for questions and concerns from Avalon Cyber’s...
Read More
Cybersecurity man with keyboard
The General Data Protection Regulation (GDPR), enacted in 2016, becomes effective in May. It requires organizations that handle the personal data of European Union (EU) citizens to ensure adequate protection is in place to prevent theft or misuse. If you live in the EU or work for a multinational corporation, this certainly isn’t news; however,...
Read More