Resilience: Enduring the Cyber Attack

RigidBitsCybersecurity Legislation, Cybersecurity Practices, Risks

Resilience is Key to Continuity Operations At Rigid Bits, we are constantly working to stay ahead of cybersecurity trends. Recently, we’ve been breaking down information for how our clients can approach understanding data security laws and how to meet their requirements. These activities have forced us to take a closer look at cybersecurity frameworks. Within the NIST cybersecurity framework, an … Read More

Guidance for approaching your Cybersecurity Program

RigidBitsCybersecurity Practices

They say that knowing is half the battle. Thanks to the NIST Cybersecurity Framework, businesses can know where they stand and where they need to go by taking an objective look at their current cybersecurity posture. For this blog post, we’ll focus on what a company, with an immature cybersecurity program, should consider when tackling cyber challenges. Cybersecurity professionals make … Read More

Business Email Compromise: Protections and Recovery

RigidBitsCybersecurity Practices

Business Email Compromise Protections and Recovery Actions In June of 2018, Crowdstrike published a blog post which outlines capabilities to pull forensic evidence from Microsoft Outlook after a business email compromise. Shortly after, these capabilities were removed and no longer available. We’ve increasingly been asked to assist with business email compromise and there have been a few key takeaways from … Read More