Son of a breach – A play on the hidden truths sustaining gullible cybersecurity casualties.

May 28, 2022

Pay for the pleasure of not watching! Almost any big-budget movie is accompanied by the appearance of fake websites offering free viewings and even downloads. Fans who try to watch...

April 15, 2022

The industrial control systems that water districts use to manage valves, pipes, and other infrastructure are notoriously open to attack. The most common vulnerabilities: remote-access networks, obvious passwords, and software...

April 1, 2022

All our hosting partners have not only been offset from a carbon perspective until 2030, but we’ve also purchased carbon credits to overcompensate so we can ensure we are capturing...

March 12, 2022

Cyber supply chain risks touch sourcing, vendor management, supply chain continuity and quality, transportation security, and many other functions across the enterprise that require a coordinated effort to address. Cyber...

October 14, 2021

With sophisticated scammers, fraudsters, and impersonators everywhere... if it sounds too good to be true, it probably is.  While there is nothing wrong with our craving for good deals, we...

October 13, 2021

Even when there’s no evidence that a cyber product works, enterprises are now willing to spend more than ever on security while their existing cybersecurity solutions are not being fully...

September 16, 2021

Organizations understand the risks of insufficient cybersecurity and have invested heavily in technological tools to counter the threats. BUT focus on tools over process is a high-tech version of assemble-it-yourself...

September 15, 2021

This crocodile will eat again and again… because many still think he carries wood! Those who have not learned from security mistakes are condemned to repeat them… Matthew Henry once...

July 25, 2021

You've been compromised! Through social engineering, attackers take advantage of human curiosity, fear and gullibility to manipulate their victims. They even take advantage of your fear of being compromised in...

July 13, 2021

Our cybersecurity budget is 2.5% of the company's overall budget! Why do we still get hit with ransomware attacks?!!!

July 12, 2021

What the FUD?  94% of malware is delivered by email and trojans account for 58% of all computer malware.

June 10, 2021

It's not about new snake oil cybersecurity, leverage your existing investments, speak to Enhalo to find out how. Contact Us Here

June 8, 2021

No more snake oil, stop ransomware with the basics. Firewall rules and air gaping, patching, and restore-able backups - speak to ENHALO to find out how! Contact Us Here

May 20, 2021

Products over process = breaches due to all the gaps that occur, because products alone, aren’t security.

May 19, 2021

If your security partner's only solution to a data breach is selling you more products related to the ones you already have... run a mile in the other direction!  Contact...


With locations in USA, Europe, Africa and Asia, Enhalo is cybersecurity brought full circle.


Stop Ransomware in its Tracks

Zero Trust Segmentation – if the agent-based solutions are putting you off… you can’t afford to miss this session with our partners AirGap.


Steps To Keep Your SME Cyber Safe

Africa Business Radio – Breakfast Show with Gerhard Conradie

Case Studies

Coral Commerce Case Study

Transitioned to cloud (AzureSQL) and PCI DSS certification to secure and maintain online business.