Blog

cybersecurity worker at computer

6 Security Trends Propelling Managed Detection and Response

After yet another year marked by an excessive amount of high-profile cyber-attacks and data breaches, every company, no matter the size, should now expect to be breached. There is a dangerously unstable balance between the ever-increasing cyber threat and cybersecurity solutions. Increasing threats across industries, and the proliferation of connected endpoints to a myriad of...
Read More
cybersecurity pro with tablet in server room

The Cybersecurity Trap: Don’t Confuse Compliance with Security

What do some of the world’s most premier data breaches—Target in 2013, Heartland Payment Systems in 2009, Anthem in 2015—have in common? In these examples (and so many more), the companies had actually met compliance requirements before the breach occurred. Whether it was PCI DSS or HIPAA, one thing became clear in the aftermath—regulatory compliance...
Read More
doctor exam cartoon

Why You and Your Network Should Get an Annual Physical

We all have that one friend…the one who hasn’t been to the doctor in 25 years since his parents stopped scheduling appointments for him, the one that says that he’d rather not know what’s wrong with him than find out he has lots of problems, or the one that says he doesn’t need to go...
Read More
Hackers Target Dominos Pizza App

Hackers Are After…Pizza?

Hackers are after…pizza? As a teenager back in the ‘90s, some of my favorite things to do included playing PlayStation and eating pizza. If I were a teenager today, the only difference would be that I’d be playing on my laptop or tablet while eating pizza. Alas, today, I am an adult. And instead of...
Read More
cybersecurity expert on computer

Why Endpoint Detection and Response (EDR) is Superior to Your Current Antivirus (AV) Tools

Why Endpoint Detection and Response (EDR) is Superior to Your Current Antivirus (AV) Tools  Just as our devices—computers, phones, tablets—are basically outdated by the time we exit the store, the same is happening for cyberattack protection. Our technology is continually becoming more sophisticated, and cybercriminals are keeping up. As we mentioned in a previous post,...
Read More
man hiding behind folder

Cybersecurity Measures That Get a C-

Why Antivirus Protection Isn’t Enough. As young students, when we didn’t want someone cheating off of our tests or papers, we put up a folder or Trapper Keeper as a barrier on our desk. This worked great unless someone stood up alleging that they had to use the bathroom. That scoundrel* then had the opportunity...
Read More
Ryan Lemieux, Avalon Cyber information security analyst

Moving On Up!

Here at Avalon, we love to see our people move up and take on new challenges. Ryan Lemieux was recently promoted to Information Security Analyst where he will be scrutinizing and providing investigative analysis of cyber events for our clients. Ryan will be the direct point of contact for questions and concerns from Avalon Cyber’s...
Read More
Cybersecurity man with keyboard

The EU’s GDPR’s Shockwaves Will Be Felt Across The Atlantic. Are You Ready?

The General Data Protection Regulation (GDPR), enacted in 2016, becomes effective in May. It requires organizations that handle the personal data of European Union (EU) citizens to ensure adequate protection is in place to prevent theft or misuse. If you live in the EU or work for a multinational corporation, this certainly isn’t news; however,...
Read More
laptop

New York Cybersecurity Regulations are Now in Effect: 4 Ways Avalon Cyber can Help You Comply

Are you compliant? Last year, the New York State Department of Financial Services (NYDFS) put in place cybersecurity requirements for financial services entities. Chances are, you aren’t compliant. So, you say, your organization doesn’t do business in New York. Or your organization is too small to be covered by the new regulations. But before we...
Read More