Insights and Resources

Cybersecurity is an ongoing partnership rather than a post-breach reaction.

  • Enhalo
  • >
  • Insights and Resources

Resources

WEBINARS
MEDIA
SON OF A BREACH
CASE STUDIES
USE CASES
The POPI Act (Protection of Personal Information Act) officially commenced on the 1st of July 2020 when it was signed...

by Gerhard Conradie

Enhalo

Across the globe, we are all working remotely — from our homes. Being able to work remotely is one thing,...

by Gerhard Conradie

Enhalo

Local Leaders In Premium IT Security Services In the 15 years that Enhalo has been in operation, we have realized...

by Gerhard Conradie

Enhalo

Managing a payroll system internally poses many possible obstacles such as backups, security updates and ransomware. Add coronavirus to the...

by Gerhard Conradie

Enhalo

Many businesses are frustrated by the gap that seems to exist between their daily operations and IT. It is a near...

by Gerhard Conradie

Enhalo

Agile microservices are becoming prolific and the accepted way in which we choose to build our apps and services. On...

by Gerhard Conradie

Enhalo

At the recent Healthcare Innovation Summit held in Johannesburg in October, speakers highlighted the potential for e-health to improve patient...

by Gerhard Conradie

Enhalo

Identify your Organization’s Weaknesses. A penetration test is arguably the most important part of any cybersecurity journey, it tests...

by Gerhard Conradie

Enhalo

Cybercriminals are getting better by the day and as the modern threats have evolved to outsmart network security, so too...

by Gerhard Conradie

Enhalo

One in three businesses fall victim to a cybersecurity breach, and of those four out of five are the direct...

by Gerhard Conradie

Enhalo

You have barbed wire fences around your house, burglar bars on your windows, alarm systems, armed response security and locks...

by Gerhard Conradie

Enhalo

The days when successful end-user happiness was measured by network uptime, has long gone. Today, customer satisfaction, staff productivity, cost...

by Gerhard Conradie

Enhalo

Much like propriety software, open source has plenty of positives and negatives. When making a decision between one or the...

by Gerhard Conradie

Enhalo

This rings especially true when your company decides to make that near-inevitable transition to cloud computing. Besides the proper scoping...

by Gerhard Conradie

Enhalo

It would be foolish to assume that SMME’s are not targets for cyber-attacks and hacking scams. Sure, it may have...

by Gerhard Conradie

Enhalo

In today’s digitally enabled age, organisations are presented with flexible options as to how and where their software is deployed...

by Gerhard Conradie

Enhalo

But this is the bricks-and- mortar crowd of yesteryear who didn’t grow up with mobile phones and tablets, and in...

by Gerhard Conradie

Enhalo

More Insights

Cyberattack Emergency

Are you experiencing an active cyberattack?

Get rapid response.

Call ENHALO’s International SOS no:
For Other Inquiries: