Son of a breach – A play on the hidden truths sustaining gullible cybersecurity casualties.

March 12, 2022

Cyber supply chain risks touch sourcing, vendor management, supply chain continuity and quality, transportation security, and many other functions across the enterprise that require a coordinated effort to address. Cyber...

October 14, 2021

With sophisticated scammers, fraudsters, and impersonators everywhere... if it sounds too good to be true, it probably is.  While there is nothing wrong with our craving for good deals, we...

October 13, 2021

Even when there’s no evidence that a cyber product works, enterprises are now willing to spend more than ever on security while their existing cybersecurity solutions are not being fully...

September 16, 2021

Organizations understand the risks of insufficient cybersecurity and have invested heavily in technological tools to counter the threats. BUT focus on tools over process is a high-tech version of assemble-it-yourself...

September 15, 2021

This crocodile will eat again and again… because many still think he carries wood! Those who have not learned from security mistakes are condemned to repeat them… Matthew Henry once...

July 25, 2021

You've been compromised! Through social engineering, attackers take advantage of human curiosity, fear and gullibility to manipulate their victims. They even take advantage of your fear of being compromised in...

July 13, 2021

Our cybersecurity budget is 2.5% of the company's overall budget! Why do we still get hit with ransomware attacks?!!!

July 12, 2021

What the FUD?  94% of malware is delivered by email and trojans account for 58% of all computer malware.

June 10, 2021

It's not about new snake oil cybersecurity, leverage your existing investments, speak to Enhalo to find out how. Contact Us Here

June 8, 2021

No more snake oil, stop ransomware with the basics. Firewall rules and air gaping, patching, and restore-able backups - speak to ENHALO to find out how! Contact Us Here

May 20, 2021

Products over process = breaches due to all the gaps that occur, because products alone, aren’t security.

May 19, 2021

If your security partner's only solution to a data breach is selling you more products related to the ones you already have... run a mile in the other direction!  Contact...

April 22, 2021

AI coupled with machine learning, next-generation, integrated, scare tactic that is powered by the DarkWeb to generate manager porn reports that bounce off Starlink satellites to scare the customers into...

Resources

With locations in USA, Europe, Africa and Asia, Enhalo is cybersecurity brought full circle.

Webinars

Stop Ransomware in its Tracks

Zero Trust Segmentation – if the agent-based solutions are putting you off… you can’t afford to miss this session with our partners AirGap.

Media

Steps To Keep Your SME Cyber Safe

Africa Business Radio – Breakfast Show with Gerhard Conradie

Case Studies

Coral Commerce Case Study

Transitioned to cloud (AzureSQL) and PCI DSS certification to secure and maintain online business.