BLOG LIBRARY

Top 3 Avoidable Employee Cybersecurity Risks

Top 3 Avoidable Employee Cybersecurity Risks

The journey of building cyber culture can be easier if your employees are aware and informed on how to improve their behaviors to avoid cybersecurity risks.
Here are 3 practical tips your employees can start implementing today. Although they might sound simple, these actions can drive an immediate impact in avoiding poor cyber decisions.

How we hire at Right-Hand careers

How we Hire at Right-Hand

At Right-Hand, we care passionately about our culture and who we hire. First and foremost, we hire people who share our core values and are excited to join our mission to make humans more defensible against cyber-threats.

MAS-TRM Regulations January 2021

Complying With the 2021 MAS-TRM Guidelines

On January 18, 2021, the Monetary Authority of Singapore (MAS) has released a revised version of its TRM guidelines – which was first published in 2013. Check out how this update relate to Policy Compliance.

New Logo and Website Launch Blog Post Featured Image

Say hello to Right-Hand’s new logo and website!

Today, we are launching Right-Hand’s new logo and website! 2020 has been a year of maturity and growth for Right-Hand, and we wanted to evolve our logo and brand in parallel with our company’s journey.

10 step PDPA checklist

10 Steps to be Compliant with PDPA

The PDPA checklist made easy: check out the 10-step list provided by the Singaporean government to help companies comply with data protection obligations.

PDPA Privacy Policy explained

5 Facts You Should Know About PDPA

Putting it simply: the Personal Data Protection Act, 2012 (PDPA) provides a framework for companies to follow for personal data protection. It comprises various rules governing the collection, use, disclosure, and care of personal data. PDPA makes it mandatory for every organization to have privacy and internal data security policies. 

How to Measure Compliance Effectiveness

How to Measure Compliance Effectiveness

This is the final post of our blog series “Everything You Need to Know About Policy Compliance”. You can find the first and second posts here and case you missed them. At this point, you’ve learned how to define and create a cybersecurity policy. This blog post will help you move forward in your journey towards cybersecurity policy compliance.

How to Define and Enforce Corporate Policies

How to Define and Enforce Corporate Policies

Now that you completed reading our first post of the series “Everything You Need to Know About Cyber Policy Compliance”, it’s time to get a better understanding of how corporate policies are built and created.

How to Get a Cyber Policy Compliance Program Started

How to Get a Cyber Policy Compliance Program Started

Setting up Cybersecurity Compliance can feel like an enormous task with no clear starting point. It might also be intimidating to know that your goal is nothing short of securing your company’s most valuable asset, namely data. In this blog posts series about corporate policy compliance, we put together all the information you need to establish your next steps towards cyber compliance.

Phishing Simulations: the Key Element of Your Cybersecurity Awareness Program

Phishing Simulations: the Key Element of Your Cybersecurity Awareness Program

After reading parts one and two of our “Phishing Simulation: Learn The Basics” series, you’re ready to plan and execute an important piece of your cybersecurity awareness program. On this third and last blog post of our series, we’ll get to the most important part of this journey. Continue reading to understand how phishing simulations help you monitor, measure, and mitigate employee error risks.

Why Phishing is Still the Most Common and Successful Type of Cyber Attack

Why Phishing is Still the Most Common and Successful Type of Cyber Attack

In part 1 of our “Phishing Simulation: Learn The Basics” series, you’ve reviewed the basics of phishing attacks. Now that you’re familiar with what phishing is, its definition, and the main types of targets and attacks, it’s time to move to part 2. Understanding what phishing is and the importance of how to run phishing simulations in a more strategic way will help you condition your employees to be less vulnerable to real attacks.

Phishing Attacks: Learn The Basics

What Everyone Should Know About Phishing Attacks

This post is the first one in the series “Phishing Simulation: Learn The Basics”, which will support you to plan and execute an important piece of your next rocking cybersecurity awareness program.

Launching PhishArm Report Phishing Emails

New Product Launch: PhishArm

Learn how PhishArm enables employees to report phishing attacks directly to their security team’s dashboard, directly from a user’s inbox. It will create an alert for the security team, while also assisting with a security incident investigation.

Right-Hand's CEO, Theo Nasser, and CTO, Uzair Ahmed

Looking back at Right-Hand’s 1st Year

We sat down to reflect with Right-Hand Cybersecurity CEO and Co-founder, Theo Nasser, and asked him a few questions on the company’s recent 1 Year Anniversary.