Resilience: Enduring the Cyber Attack

RigidBitsCybersecurity Legislation, Cybersecurity Practices, Risks

Resilience is Key to Continuity Operations At Rigid Bits, we are constantly working to stay ahead of cybersecurity trends. Recently, we’ve been breaking down information for how our clients can approach understanding data security laws and how to meet their requirements. These activities have forced us to take a closer look at cybersecurity frameworks. Within the NIST cybersecurity framework, an … Read More

GDRP Requirements Help Companies Reduce the Impact of Data Breaches

RigidBitsCybersecurity Legislation, Risks

One of the first steps a company can take when addressing their cybersecurity concerns is to select a framework for the foundation of their cybersecurity program. Sometimes organizations chose to conduct appropriate due diligence to address cybersecurity and select their own frameworks. Other times, organizations are mandated by compliance laws and regulations. Companies who are mandated to follow GDPR may … Read More

Mitigating Risks Associated With Your Personal Data


Your Data is Not YOUR Data Anymore… Your personal data is no longer yours once it has been provided to a business online. As a consumer, you have placed your trust in a business that they will adequately protect your information from unauthorized access. Hackers attempting to access this information specifically target the confidentiality of your data. It is nearly … Read More

Guidance for approaching your Cybersecurity Program

RigidBitsCybersecurity Practices

They say that knowing is half the battle. Thanks to the NIST Cybersecurity Framework, businesses can know where they stand and where they need to go by taking an objective look at their current cybersecurity posture. For this blog post, we’ll focus on what a company, with an immature cybersecurity program, should consider when tackling cyber challenges. Cybersecurity professionals make … Read More

Rigid Bits Talks Cybersecurity With Insurance Agents In Waco Texas


Trusted Choice IIAT Conference Rigid Bits attended the Trusted Choice Independent Insurance Agents of Texas conference this week in Waco Texas. The conference was aimed at helping insurance agents grow their business and better support their customers. Rigid Bits exhibited at the conference and met with business owners who clearly had Cybersecurity on their minds. We discussed Cybersecurity risk, areas … Read More

Business Email Compromise: Protections and Recovery

RigidBitsCybersecurity Practices

Business Email Compromise Protections and Recovery Actions In June of 2018, Crowdstrike published a blog post which outlines capabilities to pull forensic evidence from Microsoft Outlook after a business email compromise. Shortly after, these capabilities were removed and no longer available. We’ve increasingly been asked to assist with business email compromise and there have been a few key takeaways from … Read More

HIPAA 101: The 30-Minute Guide to Understanding Compliance


On July 18th, Rigid Bits invites agencies that sell Life and Health to join us in an overview of HIPAA and services that can simplify your compliance efforts! This July 18th, we’ll be hosting the webinar discussed below to take a closer look at HIPAA compliance requirements. Learn how to determine if HIPAA regulations apply to your business and educate your … Read More

NAIC Cybersecurity Legislation

RigidBitsCybersecurity Legislation

Insurance industry regulators (NAIC) push cybersecurity requirements Cybersecurity and insurance providers share one very similar and discerning viewpoint. Our business decisions and services we provide to customers are always based on risk. We help clients understand how threats, vulnerabilities, and their impact may disrupt personal and business continuity. The National Association of Insurance Commissioners (NAIC), a regulating body, has recognized … Read More

Should Venture Capitalists calculate cyber risks before investing? The odds say yes…


VC’s investments are prime targets for cyber attacks Venture Capitalists are serious risk takers. They offer money and consultancy to new companies with potential for significant financial return. Before an injection of capital into a company a VC will analyze the company and idea to determine if their investment is worthwhile. They may calculate the potential ROI, timelines, and risks … Read More

Colorado Legislators Propose Expansion of Cybersecurity Regulations


Newly Proposed Regulations In January of 2018 bi-partisan legislation was proposed to expand Colorado’s current cybersecurity laws. The bill, Protection for Consumer Data Privacy (HB18-1128), would broaden the scope for which companies collecting and storing data must secure personally identifiable information (PII) and report a data breach. If passed, the bill will go into effect September 1, 2018. Additionally, the … Read More