| 1 minute read

Avalon Achieves SOC 2 Type 1 Compliance

compliance graphic

Avalon is proud to announce that we have successfully completed the SOC 2 Type 1 information security audit as of July 2021. The scope of the audit included our cybersecurity, eDiscovery, and secure print and mail services.

A system and organization controls (SOC) 2 report is administered by an independent accounting and auditing firm and is based on the AICPA’s Trust Services Criteria. The resulting report verifies whether a third-party service provider that holds, stores, and/or processes private data – such as Avalon – complies with a variety of requirements, including security and availability. In short, it indicates that a vendor is a trustworthy partner with rigorous policies and procedures in place.

SOC 2 Logo 21972-312_SOC_NonCPAThere are two types of audits, SOC 2 Type 1, which assesses the design of security processes at a specific point in time, and SOC 2 Type 2, which evaluates how effective security processes are by observing a company’s operations over a period of time. Avalon is currently preparing for a SOC 2 Type 2 audit.

While Avalon has been a trusted vendor to tens of thousands of clients since 2000, achieving SOC 2 Type 1 compliance is a significant achievement that demonstrates our dedication to the highest standards of security and service.

“Avalon has always made the confidentiality, integrity, and availability of our systems and client data a paramount priority for our entire team,” says Kyle Cavalieri, president of Avalon Cyber. “Every day, we work hard building and maintaining resilient systems and applications that allow us to provide the very best professional service possible for our clients. We are proud to have completed the SOC 2 audit to validate that our company’s policies, procedures, and technical controls meet the expectations of the relevant trust principles."

Contact our team if you need assistance or have any questions about our cybersecurity services.

Blog Articles

What Every Business Leader Needs to Know About Breach Investigations

In the wake of a cybersecurity incident, executives often pose a deceptively simple question to their incident response teams: “Can you tell us exactly how the attackers got in, what they did while inside, and whether they’re still there?”

Employee Spotlight: Catelyn Allen

Every once in a while, we like to show off one of our hard-working, detail-oriented problem solvers. Take a moment to see who's in the spotlight today!

How Early Case Assessment Levels the Playing Field for Midsize Firms

When facing off against Big Law, midsize firms often grapple with a familiar challenge: delivering the same quality of representation – with a fraction of the resources. The good news? With the right technology and support, smaller firms can compete head-to-head on insight, strategy, and results.