At Right-Hand, we care passionately about our culture and who we hire. First and foremost, we hire people who share our core values and are excited to join our mission to make humans more defensible against cyber-threats.
Today, we are launching Right-Hand’s new logo and website! 2020 has been a year of maturity and growth for Right-Hand, and we wanted to evolve our logo and brand in parallel with our company’s journey.
October was an exciting month for us at Right-Hand Cybersecurity! Every October, in our industry, is recognized as Cybersecurity Awareness Month.
As we’ve previously mentioned in “5 Facts You Should Know About PDPA”, the Personal Data Protection Act, 2012 (PDPA), sets the rules on data protection in Singapore by regulating the flow of personal data among organizations. The PDPA in Singapore takes into account an individual’s right to data protection and an organization’s commercial right to collect, use, or disclose personal data for a reasonable purpose.
Putting it simply: the Personal Data Protection Act, 2012 (PDPA) provides a framework for companies to follow for personal data protection. It comprises various rules governing the collection, use, disclosure, and care of personal data. PDPA makes it mandatory for every organization to have privacy and internal data security policies.
Now that you completed reading our first post of the series “Everything You Need to Know About Cyber Policy Compliance”, it’s time to get a better understanding of how corporate policies are built and created.
Setting up Cybersecurity Compliance can feel like an enormous task with no clear starting point. It might also be intimidating to know that your goal is nothing short of securing your company’s most valuable asset, namely data. In this blog posts series about corporate policy compliance, we put together all the information you need to establish your next steps towards cyber compliance.
After reading parts one and two of our “Phishing Simulation: Learn The Basics” series, you’re ready to plan and execute an important piece of your cybersecurity awareness program. On this third and last blog post of our series, we’ll get to the most important part of this journey. Continue reading to understand how phishing simulations help you monitor, measure, and mitigate employee error risks.
In part 1 of our “Phishing Simulation: Learn The Basics” series, you’ve reviewed the basics of phishing attacks. Now that you’re familiar with what phishing is, its definition, and the main types of targets and attacks, it’s time to move to part 2. Understanding what phishing is and the importance of how to run phishing simulations in a more strategic way will help you condition your employees to be less vulnerable to real attacks.
This post is the first one in the series “Phishing Simulation: Learn The Basics”, which will support you to plan and execute an important piece of your next rocking cybersecurity awareness program.