BLOG LIBRARY

5 Behaviors that Tell Your Employees Need a Different Cybersecurity Training Approach

5 Behaviors that Tell Your Employees Need a Different Cybersecurity Training Approach

The ultimate goal of a cybersecurity training program is to guide employees to make better and cyber-aware decisions. However, companies that deliver traditional training (aka long and tedious) fail to drive real behavior change.
Check out indicators that Security Leaders can look for to identify if a security awareness program approach needs to be reviewed.

The Importance of Cybersecurity Culture & How to Build It Blog Post

The Importance of Cyber Culture & How to Build It

The fact that only 25% of business leaders are confident in their company’s cybersecurity awareness sounds intriguing – and even alarming. More than ever, it is imperative that companies focus on building Cyber Culture and cultivate it in their workplace. The importance of Cyber Culture cannot be understated, so we created this blog post to break down this concept.

The Cost of Non-Compliant with PDPA & Why it Matters

The Cost of Non-Compliance with PDPA & Why it Matters

Let’s dive deep into the financial and non-financial costs related to non-compliance with PDPA. By following the PDPA frameworks and the information provided here correctly, your organization will do a better job avoiding financial losses, as well as preserving the brand reputation and market value.

Phishing Simulation Reports Blog

Are you Getting the Most Out of Your Phishing Simulation Reports?

Phishing simulations are among the most effective tools in the cyber awareness training toolkit to train individuals against online threats. However, simulating phishing attacks as a single action is not enough to prepare you to protect your employees from cybercrime. 

Top 3 Avoidable Employee Cybersecurity Risks

Top 3 Avoidable Employee Cybersecurity Risks

The journey of building cyber culture can be easier if your employees are aware and informed on how to improve their behaviors to avoid cybersecurity risks.
Here are 3 practical tips your employees can start implementing today. Although they might sound simple, these actions can drive an immediate impact in avoiding poor cyber decisions.

How we hire at Right-Hand careers

How we Hire at Right-Hand

At Right-Hand, we care passionately about our culture and who we hire. First and foremost, we hire people who share our core values and are excited to join our mission to make humans more defensible against cyber-threats.

MAS-TRM Regulations January 2021

Complying With the 2021 MAS-TRM Guidelines

On January 18, 2021, the Monetary Authority of Singapore (MAS) has released a revised version of its TRM guidelines – which was first published in 2013. Check out how this update relate to Policy Compliance.

New Logo and Website Launch Blog Post Featured Image

Say hello to Right-Hand’s new logo and website!

Today, we are launching Right-Hand’s new logo and website! 2020 has been a year of maturity and growth for Right-Hand, and we wanted to evolve our logo and brand in parallel with our company’s journey.

10 step PDPA checklist

10 Steps to be Compliant with PDPA

The PDPA checklist made easy: check out the 10-step list provided by the Singaporean government to help companies comply with data protection obligations.

PDPA Privacy Policy explained

5 Facts You Should Know About PDPA

Putting it simply: the Personal Data Protection Act, 2012 (PDPA) provides a framework for companies to follow for personal data protection. It comprises various rules governing the collection, use, disclosure, and care of personal data. PDPA makes it mandatory for every organization to have privacy and internal data security policies. 

How to Measure Compliance Effectiveness

4 Tips for a Successful Cybersecurity Policy Compliance Program

After speaking with Governance, Risk and Compliance (GRC) leaders, we’ve learned and summarized several challenges organizations face when creating a successful cybersecurity policy compliance program. Here are 4 tips for a successful cybersecurity policy compliance program.

Launching PhishArm Report Phishing Emails

New Product Launch: PhishArm

Learn how PhishArm enables employees to report phishing attacks directly to their security team’s dashboard, directly from a user’s inbox. It will create an alert for the security team, while also assisting with a security incident investigation.

Right-Hand's CEO, Theo Nasser, and CTO, Uzair Ahmed

Looking back at Right-Hand’s 1st Year

We sat down to reflect with Right-Hand Cybersecurity CEO and Co-founder, Theo Nasser, and asked him a few questions on the company’s recent 1 Year Anniversary.