| 1 minute read

Avalon Achieves SOC 2 Type 1 Compliance

compliance graphic

Avalon is proud to announce that we have successfully completed the SOC 2 Type 1 information security audit as of July 2021. The scope of the audit included our cybersecurity, eDiscovery, and secure print and mail services.

A system and organization controls (SOC) 2 report is administered by an independent accounting and auditing firm and is based on the AICPA’s Trust Services Criteria. The resulting report verifies whether a third-party service provider that holds, stores, and/or processes private data – such as Avalon – complies with a variety of requirements, including security and availability. In short, it indicates that a vendor is a trustworthy partner with rigorous policies and procedures in place.

SOC 2 Logo 21972-312_SOC_NonCPAThere are two types of audits, SOC 2 Type 1, which assesses the design of security processes at a specific point in time, and SOC 2 Type 2, which evaluates how effective security processes are by observing a company’s operations over a period of time. Avalon is currently preparing for a SOC 2 Type 2 audit.

While Avalon has been a trusted vendor to tens of thousands of clients since 2000, achieving SOC 2 Type 1 compliance is a significant achievement that demonstrates our dedication to the highest standards of security and service.

“Avalon has always made the confidentiality, integrity, and availability of our systems and client data a paramount priority for our entire team,” says Kyle Cavalieri, president of Avalon Cyber. “Every day, we work hard building and maintaining resilient systems and applications that allow us to provide the very best professional service possible for our clients. We are proud to have completed the SOC 2 audit to validate that our company’s policies, procedures, and technical controls meet the expectations of the relevant trust principles."

Contact our team if you need assistance or have any questions about our cybersecurity services.

Blog Articles

Employee Spotlight: Sofia Johnson

 

 

Every once in a while, we like to show off one of our hard-working, detail-oriented problem solvers. Take a moment to see who's in the spotlight today!

Mastering Basic Cybersecurity Hygiene for Long-Term Success

As a cybersecurity leader who’s seen too many breaches start with the simplest oversights, I often say: “You can’t build castles on a sand foundation.” In today’s landscape, where ransomware attacks are a daily occurrence for businesses large and small, basic cybersecurity hygiene isn’t optional; it’s your first line of defense – the basics that keep your organization resilient.

Analyzing September 2025’s Critical Zero-Day Vulnerabilities

September 2025 has been a powerful reminder that today’s greatest cyber risks often come from the software we rely on most. In just a few short weeks, organizations faced a wave of critical zero-day vulnerabilities across remote access gateways, communication apps, password managers, and even everyday utilities. These weren’t hypothetical risks – they were live, actively exploited threats.