Cybersecurity misconceptions are everywhere, have you spotted some? What can you do about cybersecurity misconceptions that keep showing up? Over the last few months, we’ve been on the road holding and listening to a lot of conversations about cybersecurity. It’s really fascinating because you really can drop each one into a specific category. Some of the ones we’re really happy … Read More
Rigid Bits Educates Conference Attendees
Rigid Bits Presented at the Trusted Choice Agents of Colorado 2019 Convention this week. We covered topics that can help a business start a new cybersecurity program. If you’re facing compliance regulations or 3rd party vendor requests to confirm your cybersecurity program, where do you start? Rigid Bits presented our 30-day action plan and talked about utilizing a risk-based approach … Read More
Avoiding a false sense of security
Unsure if your IT provider or MSP is properly implementing cybersecurity? Continue reading…
Rigid Bits on the Move
Rigid Bits has had a very busy start to the summer. We’ve moved to a larger office, attended Accelerate, and will be in Texas for Insurcon 2019!
Guidance For Approaching Data Security Regulations
Every day at Rigid Bits, we are working to help businesses understand cybersecurity. As part of those education efforts, we’ve spent some time thinking about how companies required to abide by data security laws can best approach meeting requirements. Data Security Simplified We’ve developed a quick, 2-page guide, to understand the approach of compliance. The guide is intended to give … Read More
Resilience: Enduring the Cyber Attack
Resilience is Key to Continuity Operations At Rigid Bits, we are constantly working to stay ahead of cybersecurity trends. Recently, we’ve been breaking down information for how our clients can approach understanding data security laws and how to meet their requirements. These activities have forced us to take a closer look at cybersecurity frameworks. Within the NIST cybersecurity framework, an … Read More
Guidance for approaching your Cybersecurity Program
They say that knowing is half the battle. Thanks to the NIST Cybersecurity Framework, businesses can know where they stand and where they need to go by taking an objective look at their current cybersecurity posture. For this blog post, we’ll focus on what a company, with an immature cybersecurity program, should consider when tackling cyber challenges. Cybersecurity professionals make … Read More
Business Email Compromise: Protections and Recovery
Business Email Compromise Protections and Recovery Actions In June of 2018, Crowdstrike published a blog post which outlines capabilities to pull forensic evidence from Microsoft Outlook after a business email compromise. Shortly after, these capabilities were removed and no longer available. We’ve increasingly been asked to assist with business email compromise and there have been a few key takeaways from … Read More