Rigid Bits Cybersecurity Blog

Categories
Cybersecurity Practices

Stopping Phishing Attacks with Better Email Security

We all accept risks when we communicate by email, and it can be nearly impossible to keep that line of communication open without letting a few illegitimate emails slip through our blind spots. In this post, we’ll talk about how phishing attacks play out for businesses and share some ideas on how to defend yourself from this highly successful method of attack.

Read More »
Cybersecurity Practices

C.I.A. Triad of Information Security

As you work to understand the impact of a risk, you should look to the C.I.A. Triad of Information Security and its foundational principles for guidance. This takes into consideration how an attack may impact information systems your business relies on or the data that you protect and manage.

Read More »
Cybersecurity Practices

Cybersecurity Awareness Month

Each week this October, Rigid Bits is offering free events designed to help your business overcome cybersecurity and compliance challenges. Learn about ways to reduce cybersecurity risks and build a stronger cybersecurity culture for your business.

Read More »
Cybersecurity Practices

Challenging the C.I.A.

Times are changing for cybersecurity. Where are we headed? Where are we now? We’ll dive into the new concept of the D.I.E. Triad.

Read More »
News

Impact of The SolarWinds Attack

The SolarWinds attack is the most prolific cyber attack in history and will have far-reaching consequences on all levels of business. Major attacks are becoming more common, so why is

Read More »
Cybersecurity Practices

Is Your Trust Model Increasing Risk?

Is your trust model increasing your risk? Before we can answer that, let’s clarify what a trust model entails. Assessing risk requires an understanding of trust Risk assessment is the

Read More »
Cybersecurity Practices

Methods of Endpoint Protection

In this critical and trying time our connections have become even more valuable and yet more vulnerable. What can we do to best protect the endpoints, our desktops, laptops, and

Read More »
Risks

Unrealized Cybersecurity Risk

Cybersecurity risks can be realized through risk identification exercises, but what about unrealized cybersecurity risk? Start with a Risk Assessment As your company builds a cybersecurity program, a lot of

Read More »