The journey of building cyber culture can be easier if your employees are aware and informed on how to improve their behaviors to avoid cybersecurity risks.
Here are 3 practical tips your employees can start implementing today. Although they might sound simple, these actions can drive an immediate impact in avoiding poor cyber decisions.
At Right-Hand, we care passionately about our culture and who we hire. First and foremost, we hire people who share our core values and are excited to join our mission to make humans more defensible against cyber-threats.
On January 18, 2021, the Monetary Authority of Singapore (MAS) has released a revised version of its TRM guidelines – which was first published in 2013. Check out how this update relate to Policy Compliance.
Today, we are launching Right-Hand’s new logo and website! 2020 has been a year of maturity and growth for Right-Hand, and we wanted to evolve our logo and brand in parallel with our company’s journey.
October was an exciting month for us at Right-Hand Cybersecurity! Every October, in our industry, is recognized as Cybersecurity Awareness Month.
The PDPA checklist made easy: check out the 10-step list provided by the Singaporean government to help companies comply with data protection obligations.
Putting it simply: the Personal Data Protection Act, 2012 (PDPA) provides a framework for companies to follow for personal data protection. It comprises various rules governing the collection, use, disclosure, and care of personal data. PDPA makes it mandatory for every organization to have privacy and internal data security policies.
This is the final post of our blog series “Everything You Need to Know About Policy Compliance”. You can find the first and second posts here and case you missed them. At this point, you’ve learned how to define and create a cybersecurity policy. This blog post will help you move forward in your journey towards cybersecurity policy compliance.
Now that you completed reading our first post of the series “Everything You Need to Know About Cyber Policy Compliance”, it’s time to get a better understanding of how corporate policies are built and created.
Setting up Cybersecurity Compliance can feel like an enormous task with no clear starting point. It might also be intimidating to know that your goal is nothing short of securing your company’s most valuable asset, namely data. In this blog posts series about corporate policy compliance, we put together all the information you need to establish your next steps towards cyber compliance.
After reading parts one and two of our “Phishing Simulation: Learn The Basics” series, you’re ready to plan and execute an important piece of your cybersecurity awareness program. On this third and last blog post of our series, we’ll get to the most important part of this journey. Continue reading to understand how phishing simulations help you monitor, measure, and mitigate employee error risks.
In part 1 of our “Phishing Simulation: Learn The Basics” series, you’ve reviewed the basics of phishing attacks. Now that you’re familiar with what phishing is, its definition, and the main types of targets and attacks, it’s time to move to part 2. Understanding what phishing is and the importance of how to run phishing simulations in a more strategic way will help you condition your employees to be less vulnerable to real attacks.
This post is the first one in the series “Phishing Simulation: Learn The Basics”, which will support you to plan and execute an important piece of your next rocking cybersecurity awareness program.
Learn how PhishArm enables employees to report phishing attacks directly to their security team’s dashboard, directly from a user’s inbox. It will create an alert for the security team, while also assisting with a security incident investigation.
We sat down to reflect with Right-Hand Cybersecurity CEO and Co-founder, Theo Nasser, and asked him a few questions on the company’s recent 1 Year Anniversary.