BLOG LIBRARY

How we hire at Right-Hand careers

How we Hire at Right-Hand

At Right-Hand, we care passionately about our culture and who we hire. First and foremost, we hire people who share our core values and are excited to join our mission to make humans more defensible against cyber-threats.

New Logo and Website Launch Blog Post Featured Image

Say hello to Right-Hand’s new logo and website!

Today, we are launching Right-Hand’s new logo and website! 2020 has been a year of maturity and growth for Right-Hand, and we wanted to evolve our logo and brand in parallel with our company’s journey.

10 step PDPA checklist

10 Steps to be Compliant with PDPA

As we’ve previously mentioned in “5 Facts You Should Know About PDPA”, the Personal Data Protection Act, 2012 (PDPA), sets the rules on data protection in Singapore by regulating the flow of personal data among organizations. The PDPA in Singapore takes into account an individual’s right to data protection and an organization’s commercial right to collect, use, or disclose personal data for a reasonable purpose.

PDPA Privacy Policy explained

5 Facts You Should Know About PDPA

Putting it simply: the Personal Data Protection Act, 2012 (PDPA) provides a framework for companies to follow for personal data protection. It comprises various rules governing the collection, use, disclosure, and care of personal data. PDPA makes it mandatory for every organization to have privacy and internal data security policies. 

How to Define and Enforce Corporate Policies

How to Define and Enforce Corporate Policies

Now that you completed reading our first post of the series “Everything You Need to Know About Cyber Policy Compliance”, it’s time to get a better understanding of how corporate policies are built and created.

How to Get a Cyber Policy Compliance Program Started

How to Get a Cyber Policy Compliance Program Started

Setting up Cybersecurity Compliance can feel like an enormous task with no clear starting point. It might also be intimidating to know that your goal is nothing short of securing your company’s most valuable asset, namely data. In this blog posts series about corporate policy compliance, we put together all the information you need to establish your next steps towards cyber compliance.

Phishing Simulations: the Key Element of Your Cybersecurity Awareness Program

Phishing Simulations: the Key Element of Your Cybersecurity Awareness Program

After reading parts one and two of our “Phishing Simulation: Learn The Basics” series, you’re ready to plan and execute an important piece of your cybersecurity awareness program. On this third and last blog post of our series, we’ll get to the most important part of this journey. Continue reading to understand how phishing simulations help you monitor, measure, and mitigate employee error risks.

Why Phishing is Still the Most Common and Successful Type of Cyber Attack

Why Phishing is Still the Most Common and Successful Type of Cyber Attack

In part 1 of our “Phishing Simulation: Learn The Basics” series, you’ve reviewed the basics of phishing attacks. Now that you’re familiar with what phishing is, its definition, and the main types of targets and attacks, it’s time to move to part 2. Understanding what phishing is and the importance of how to run phishing simulations in a more strategic way will help you condition your employees to be less vulnerable to real attacks.

Phishing Attacks: Learn The Basics

What Everyone Should Know About Phishing Attacks

This post is the first one in the series “Phishing Simulation: Learn The Basics”, which will support you to plan and execute an important piece of your next rocking cybersecurity awareness program.