• ®
  • About
    • About Us

      Security. It’s in our DNA. It’s elemental, foundational. Something that an always-on, everything’s-IoT-connected world depends on.

      Helping mid-to-enterprise organizations protect assets and manage risk is our only business. Our mission is to make our customers’ world a safer place so that they may thrive in an always-on, connected world.

    • Leadership
    • Careers
  • Solutions

    Governance, Risk & Compliance

    • Compliance Audit & Risk Assessment
    • Compliance Program Development
    • Continuous Compliance & Policy Management

    Attack Surface Management

    • Tool Consolidation & Optimization
    • Configuration & Deployment
    • Testing & Exposure

    Managed XDR & SecOps

    • Fusion MXDR
    • Configuration & Managed Services

    Microsoft Security Solutions

    • Threat Protection & Cloud Security
    • Data Security, Compliance & Privacy
    • Identity & Endpoint Management
    • AI Safety & Security
    • Microsoft Security Foundations
  • Partners
  • News & Resources
    • All resources
    • Flash-Notices
    • Blogs
    • Webinars

    Latest resource

    Building Trust Over Time: SOC 2 and the Importance of Annual Audits

    Business relationships are founded on trust, and in today’s digital world, trust around data security is especially critical.

    Learn more
  • Contact
    • About Us
    • Leadership
    • Careers
  • Governance, Risk & Compliance

    • Compliance Audit & Risk Assessment
    • Compliance Program Development
    • Continuous Compliance & Policy Management

    Attack Surface Management

    • Tool Consolidation & Optimization
    • Configuration & Deployment
    • Testing & Exposure

    Managed XDR & SecOps

    • Fusion MXDR
    • Configuration & Managed Services

    Microsoft Security Solutions

    • Threat Protection & Cloud Security
    • Data Security, Compliance & Privacy
    • Identity & Endpoint Management
    • AI Safety & Security
    • Microsoft Security Foundations
  • Partners
    • All resources
    • Flash-Notices
    • Blogs
    • Webinars
  • Contact

Avertium Blog

 | Mar 24, 2020

Catch of the Week: Phishing Scam Round-up, March 18 - 24, 2020

In the Catch of the Week post every Tuesday, we will feature a compilation of the latest articles from COVID-19 related scams and phishing campaigns.
 | Mar 24, 2020

COVID-19 Phishing Scams to Watch For

Covid-19 phishing scams and other social engineering tactics exploiting this confusing time are surfacing. Watch for these to protect your organization.
 | Mar 23, 2020

Latest Pawn Storm attack methods

An analysis of Pawn Storm aka APT28 aka Fancy Bear. It contains recommendations on how to prevent an attack in 2020.
 | Mar 16, 2020

Comparing GDPR versus CCPA

This article comparing GDPR versus CCPA explains these consumer data privacy regulations are similar in intent but very different in execution.
 | Mar 16, 2020

Vulnerability CVE-2020-0684 detected in Windows .LNK files

This report gives information about CVE-2020-0684 regarding a vulnerability that affects Windows .LNK files. Patching version included.
 | Mar 9, 2020

Cybersecurity Spring Cleaning: 7 Steps for Critical Data Scanning

Cybersecurity spring cleaning should include critical data scanning using these 7 steps for data hygiene at least once a year. Learn more.
 | Mar 9, 2020

ManageEngine Desktop Central, CVE-2020-10189

This threat report gives information about CVE-2020-10189 regarding a vulnerability the ManageEngine Desktop Central software. Patching version included.
 | Mar 3, 2020

3 Reasons why you need a Human-Run Penetration Test

A human-run penetration test is a cybersecurity best practice that allows ethical hackers to proactively discover vulnerabilities for remediation.
 | Feb 26, 2020

Avertium named to CRN MSP 500 Top 100 Security List for fourth consecutive year

Avertium, the national managed security and consulting provider, announced the company has been named to the CRN® 2020 MSP 500 Security 100 category.
 | Feb 25, 2020

CVE-2020-1938, GhostCat Vulnerability

This TIR gives info about CVE-2020-1938, or GhostCat vulnerability and how it affects the Apache Tomcat software package. Patching versions included.
Prev 15 16 17 18 19 Next
Cybersecurity Solutions
  • Governance, Risk, + Compliance (GRC)
  • Attack Surface Management (ASM)
  • Managed XDR & SecOps
  • Microsoft Security Solutions
Company
  • About Avertium
  • Partners
  • Leadership Team
  • Careers
  • Resources
  • Contact
  • Privacy and Legal

Sign up for weekly Flash Notices, tips and security news.

Have questions? Give us a call at 877-707-7997.

logo
Avertium Cyber Fusion Centers
Arizona • Tennessee

Copyright © 2025 Avertium.
All Rights Reserved. Privacy Policy