Services
MDR Cybersecurity Service Plans
Managed Detection & Response (MDR)
Managed Extended Detection & Response (MXDR)
Vulnerability Assessments
Penetration Testing
Incident Response
Incident Response Retainer Program
Security Advisory Services
Virtual Chief Information Security Officer (vCISO)
Microsoft 365 Security Assessment
Data Breach Review
Data Breach Notifications
Dark Web Monitoring
Phishing Simulation and Training
Why Avalon Cyber?
Resources
Knowledge Center
Webinars
Blog
In The News
Leadership
Contact Us
Careers
Service Plans & Pricing
Services
MDR Cybersecurity Service Plans
Managed Detection & Response (MDR)
Managed Extended Detection & Response (MXDR)
Vulnerability Assessments
Penetration Testing
Incident Response
Incident Response Retainer Program
Security Advisory Services
Virtual Chief Information Security Officer (vCISO)
Microsoft 365 Security Assessment
Data Breach Review
Data Breach Notifications
Dark Web Monitoring
Phishing Simulation and Training
Why Avalon Cyber?
Resources
Knowledge Center
Webinars
Blog
In The News
Leadership
Contact Us
Careers
Service Plans & Pricing
Knowledge Center
Resource Types
All types
Brochures
Case Studies
Infographics
Reports
Videos
White Papers
Gap & Readiness Assessments
DOWNLOAD NOW
Policy & Documentation Development
DOWNLOAD NOW
Managed Extended Detection & Response
Purple Team Case Study
Avalon Cyber Brochure
Tabletop Exercise Case Study
Penetration Testing Services
MDR Cybersecurity Service Plans
Turning the Tables on Cyber Breaches
vCISO Services
7 Ways Employees Put Corporate Data at Risk
2022 Ransomware Report
Microsoft 365 Best Practices Security Assessment
2022 Phishing Report
Security Advisory Services
Incident Response Retainer Services
A Guide to NYS SHIELD Compliance
Cybersecurity Maturity Model Certification (CMMC) Services
Log4j Vulnerability Information
Lockbit 2.0 Ransomware Infographic
When Assumptions Aren’t Enough: The Future of Cyber Risk
Remote Desktop Protocol (RDP) Attacks
The Argument for Opensource SIEMs
KnightVision CAM: Compliance, Alerting, Monitoring
Case Study: Incident Response – Cybercriminal Attempts to Execute a Ransomware Attack on Christmas Day
Case Study: Incident Response – Cybercriminal Nearly Gains Access Through Third-Party App
Incident Response- How Hackers Attack
Video – Using Threat Intelligence for Cyber Incident Response Investigations
Cybersecurity Risks with Corporate Mergers and Acquisitions
Healthcare is a Top Three Target for Hackers and Organized Crime Groups
Law Firms are a Primary Target
KnightVision Showcase
Being Proactive vs. Reactive
Incident Response: Office365 Email Compromise
Incident Response: Email Phishing Attacks
Case Study: A Corporate Employee Steals Critical Data
Data Breaches – A Year at a Glance
Incident Response and Forensic Investigation
Why You Need an EDR Solution
Not Another Boring Research Report – Law Firm Cyber Security Trends
Internal Investigations – Unauthorized Access to Digital Materials
IP Theft – Former Employee Steals Company Data For New Employer
Incident Response – Website Leaks Job Applications and Social Security Numbers
6 Steps to a Successful Cybersecurity Strategy: For the Highly Targeted Law Firm
11 Critical Questions To Ask Your IT Provider (Before It’s Too Late)
Learn More