Rigid Bits Cybersecurity Blog

Categories
Risks

Methods of Endpoint Protect

In this critical and trying time our connections have become even more valuable and yet more vulnerable. What can we do to best protect the endpoints, our desktops, laptops, and

Read More »
Risks

Unrealized Cybersecurity Risk

Cybersecurity risks can be realized through risk identification exercises, but what about unrealized cybersecurity risk? Start with a Risk Assessment As your company builds a cybersecurity program, a lot of

Read More »
Cybersecurity Practices

The Cyber Liability Perfect Storm

What lessons can we learn about the perfect storm hurricane that shapped the insurance industry in Florida? While not a huge problem at the moment, it may be worth keeping

Read More »
Cybersecurity Practices

When the F.U.D. is wrong…

Cybersecurity FUD is everywhere and sometimes it helps drive home a point. Other times, it’s just down right wrong. Replace a FUD based approach with a Risk based approach to enhance your cybersecurity.

Read More »