Rigid Bits Cybersecurity Blog

Categories
Risks

Methods of Endpoint Protection

In this critical and trying time our connections have become even more valuable and yet more vulnerable. What can we do to best protect the endpoints, our desktops, laptops, and

Read More »
Risks

Unrealized Cybersecurity Risk

Cybersecurity risks can be realized through risk identification exercises, but what about unrealized cybersecurity risk? Start with a Risk Assessment As your company builds a cybersecurity program, a lot of

Read More »
Rigid Bits POA&M
Cybersecurity Practices

POA&Ms to Guide Cybersecurity Implementation

As cybersecurity experts, one of the biggest challenges we see our clients struggle with is tracking the growth of their cybersecurity programs. That’s why our security program develop capabilities, including

Read More »
Cybersecurity Practices

The Cyber Liability Perfect Storm

What lessons can we learn about the perfect storm hurricane that shapped the insurance industry in Florida? While not a huge problem at the moment, it may be worth keeping

Read More »