RHC-A cybersecurity strategies