Cyber Security

  • Internet Explorer Zero Day Vulnerability

    Qihoo 360, a Chinese internet security company, discovered a zero-day vulnerability (CVE – 2018 – 8174) with the current version of Internet Explorer after foreign trade organizations in China were affected by the exploit. The “double kill”…

    | May 31, 2018
  • GDPR: The End of Gated Content?

    As the GDPR comes into effect, many marketers are scrambling to align their online marketing strategies to the regulation. Unfortunately, like most regulations, there are many requirements that are confusing or ambiguous; one of those is the…

    Chris Debo, CISA Chris Debo, CISA | May 28, 2018
  • Addressing the Ransomware Threat at Hospitals and Health Systems

    Working toward a cross-functional solution to protect against the ransomware threat. The key operational challenge with a ransomware attack at a hospital is that system downtime is basically a guarantee. Whether the ransomware itself cripples one or…

    Avalution Team Avalution Team | May 03, 2018
  • Using DMARC Effectively

    Implementing DMARC is one thing. Making the commitment to implement DMARC in its most aggressive configuration is another. Conceptually, Domain-based Message Authentication, Reporting, and Conformance (DMARC) is simple. DMARC provides a mechanism for email receivers to validate…

    Avalution Team Avalution Team | Feb 28, 2018
  • Are You Ready for the General Data Protection Regulation (GDPR)?

    As we move closer to the enforceable compliance date of May 25, 2018 for the General Data Protection Regulation (GDPR), many organizations are asking themselves if they are on track to meet the regulation requirements. Many organizations…

    | Jan 30, 2018
  • Formalizing an Information Security Program

    Formalizing your information security program is a critical step to drive information security capability maturation in any organization. The intent of formalizing a program is to get clear on focus and ensure everyone is on the same…

    Rob Giffin Rob Giffin | Nov 27, 2017
  • Ransomware Changes the Game for IT Disaster Recovery

    Imagine entering your workplace and being met with a sign instructing you NOT to turn on your desktop computers or dock your laptops until further notice. No network access; no email; no dependent application. Unfortunately, this was…

    Rob Giffin Rob Giffin | Oct 25, 2017
  • Introducing Our Information Security Practice

    For twelve years, Avalution has been laser focused on business continuity. We’ve become the leading provider of business continuity software and consulting in the US. We work with 13% of the Fortune 100, including the largest organizations…

    Rob Giffin Rob Giffin | Jul 27, 2017
  • Ownership – Where Do Our Responsibilities Begin and End as Business Continuity Professionals?

    As published in the Summer 2016 Issue of the Disaster Recovery Journal – Volume 29, Number 3. One of the latest threats to organizations is something termed “ransomware”.  Commonly defined as a type of malware that blocks…

    Brian Zawada, FBCI Brian Zawada, FBCI | Aug 15, 2016
  • Integrating Cyber Security and Business Continuity

    The last several years have continued to see an increase in the sophistication and volume of cyber threats, with a 42% increase in targeted attacks in 2012 (as reported by Symantec, in its 2013 Internet Security Threat…

    Avalution Team Avalution Team | Dec 05, 2013