Staying Ahead in the Cybersecurity Arms Race

Cyber criminals are investing heavily in talent and technology.

Cybercriminals are investing heavily in talent and technology. Are you investing just as heavily in solutions to keep pace? Cybercriminals are not lone hackers working in isolation. They operate as part of organised groups with access to advanced technologies and resources. These adversaries are continuously honing their skills, developing new tactics, and leveraging cutting-edge tools […]

Trading Authority for Security: The CEO’s Dilemma

This comic illustrates a real-world issue many executives face.

In the fast-paced world of business, CEOs are often seen as the ultimate decision-makers, wielding authority over their enterprises with precision and determination. However, in today’s digital landscape, where cybersecurity threats are increasingly prevalent, even the most powerful leaders find themselves at a crossroads: the necessity of trading a bit of authority for enhanced security. […]

Simplifying Cybersecurity: Bridging the Gap Between Tech Speak and Business Insight

Bridge the communication gap on cyber risk

The divide between technical jargon and business strategy can often lead to misunderstandings and missed opportunities for effective cybersecurity management. ENHALO’s Son of a Breach humorously highlights this common scenario, emphasising the importance of “Bridging the tech-talk gap, one translation at a time.” The Challenge of Technical Communication Cybersecurity professionals speak a language brimming with […]

Lost in Translation: Bridging the Cybersecurity Communication Gap

Lost in Translation: Bridging the Cybersecurity Communication Gap

In the high-stakes world of corporate cybersecurity, effective communication between technical experts and non-technical executives is crucial. Yet, all too often, this dialogue gets “Lost in Translation,” leading to misunderstandings and gaps in implementing effective cyber defense strategies. Our latest creative approach, showcased in this innovative comic, underscores this challenge and offers a whimsical yet […]

Tools evolve, techniques refine, but some hacking basics? Timelessly divine!

Some hacking basics have not changed over the years.

In the comic yet perilous world of Enhalo Cybersecurity’s Son of a Breach we dive headfirst into the underbelly of cybersecurity’s most enduring paradoxes. Amidst the high-tech arms race of defenses and attacks, there lies an immutable truth: the most fundamental hacking tactics remain as effective as ever. Classic Hacking Tactics Is A Timeless Threat […]

Fly Under The Threat Radar: The Optimal Safety Zone

Fly under the threat radar - the optimal safety zone

Across the cybersecurity spectrum the adage “no news is good news” holds particularly true. The industry’s nature is such that companies seldom gain media attention for the robustness of their cyber defenses. Instead, headlines are dominated by tales of breaches, data theft, and compromised systems. It’s an unfortunate reality that a company’s commitment to cybersecurity […]

Hitting the Jackpot: A Cybersecurity Comic with a Twist

When ransomware hits the jackpot

In the glittering world of casinos, where fortune flirts with every flick of a card and the roll of a dice, there’s an unseen player at the tables – one that’s not playing by the rules. Our latest comic takes a lighthearted yet piercing look at the menace of ransomware in the casino industry, inspired […]

The Perils of the ANY-ANY Condition: A Cautionary Comic Tale

Someone forgot to deactivate the ANY-ANY condition!

In the bustling world of digital defense, where cybersecurity warriors tirelessly guard against the ceaseless onslaught of cyber threats, there lies a tale as old as time – or at least as old as firewalls. This is the story of the infamous ANY-ANY condition, a tale that unfolds in the panels of our latest comic, […]

The Holistic Approach to Cybersecurity: Beyond Just Tools and Products

Enhalo-cyber-comic

In cybersecurity, traditional strategies often fall short, akin to the incomplete task of attempting to cleanse hands with soap but no water. This analogy perfectly illustrates the limitations of relying solely on various security products and tools without fostering a comprehensive defense mechanism. Just as soap requires water to effectively remove dirt, cybersecurity demands a […]

Beware of Geeks Bearing Gifts: Casinos are Prime Targets

Cyber Comic: The Trojan Horse

As we shuffle into January 2024, let’s not forget that the house isn’t the only one that wants to win. As revealed in a recent report (source: Cybersecurity Dive), casinos have become prime targets for ransomware attacks. And just like in any game of chance, you never know when your number’s up. Our latest Son […]

Happy Holidays from all of us at ENHALO

Cyber Comic: Festive Season Wishes

As the festive season brings joy, warmth, and cheer, we want to extend our heartfelt gratitude to you for your continued trust in our cybersecurity services. This time of year is a reminder of the importance of connections – both personal and digital. While you connect with your loved ones, rest assured that we remain […]

Ho-Ho-Hold On To Your Data!

Cyber Comic: Unauthorized Access Festive Season

As the holiday season approaches, it’s a time of joy, celebration, and heightened vigilance in the world of cybersecurity. At ENHALO, we embrace the festive spirit with a crucial reminder for all businesses: Ho-ho-hold on to your data! In these times of cheer and goodwill, it’s easy to get distracted by the festivities, but let’s […]

How Can One Tiny Email Attachment Cause So Much Trouble?

Enhalo Comic focussing on the risks of email attachments.

Ah, the eternal mystery of human curiosity! Despite the warnings, cautionary tales, and abundant literature on the dangers of email attachments, some brave souls still dare to venture into the treacherous realm of unknown attachments. Perhaps it’s the allure of the unknown, the digital equivalent of Pandora’s box. The very notion that an email holds […]

SOC – Security Operations Center Is Not Working As It Should

SOC - Security Operations Center is not working as it should.

Once upon a time, in a Security Operations Center not so far away, chaos reigned supreme. It was a comically disastrous scene, where the security systems seemed to have developed a mind of their own. Instead of protecting the network, they decided to engage in a rebellious game of hide-and-seek, hiding alerts and running away […]

Racing Towards Cybersecurity Excellence at the UK Grand Prix!

Son of a Breach Enhalo Cyber Humour - cybersecurity at the races

As the world’s top drivers compete for victory on the track, let’s not forget the parallel race happening in the digital realm. Cybersecurity is the engine that fuels our connected world, safeguarding our data and privacy. Just like the finely tuned engines of these high-performance cars, we must prioritise cyber defences to stay ahead of […]

Game, Set, Cybersecurity!

Son of a Breach Enhalo Comic 55 - Wimbledon empire has a new security job

Just as an umpire ensures fair play and enforces the rules at Wimbledon, cybersecurity is the guardian of your digital court. It keeps the “game of technology” secure, defending against threats and ensuring a protected playing field. Ace your cybersecurity game and protect your data with unwavering vigilance. Let us help you serve up a […]

If you don’t give your company’s data security enough attention, the bad guys will

Unprotected data. Comic about not giving your company's data security enough attention, while the bad guys are.

So what happens when security is an afterthought? In 2023, the consequences of treating cybersecurity as an afterthought have become more evident and costly than ever before. Recent statistics paint a stark picture: according to a report by Cybersecurity Ventures, the global cost of cybercrime is expected to grow by 15% per year over the […]

Companies Are Hacked Because of Mistakes Individuals Keep Making

Cybersecurity Humor: companies are hacked because of mistakes individuals keep making

Most of the time, companies are hacked because of mistakes individuals keep making. Not because you, or anyone else is stupid, but because cyber criminals are clever and despite the increasing awareness of cyber risks, people often underestimate the potential consequences of their actions and overlook simple security measures. Employees may also not really know […]

Streamlining Security Operations: The Case for Integrated Solutions

Son of a Breach Enhalo Comic 25 - use duct tape to get security tools to work together

“Security buyers often have dozens of different tools from multiple vendors, and generally have to use a fair amount of duct tape to get them to work together. This creates complexity, cost, and overhead.” Mike Hanley, Chief Information Security Officer, Cisco With the increasing number of threats and vulnerabilities, security buyers find themselves juggling multiple […]

Zero Trust Architecture

Son of a Breach Enhalo Comic - zero trust architecture

With 93% of firms globally admitting they have suffered a direct cybersecurity breach because of weaknesses in their supply chains and the average number of breaches increasing 37% year-over-year, the threat for cyberattacks across the entire supply chain sector will only continue to grow in 2022. (sdcexec) No security defense is guaranteed to prevent supply […]

Hackers Operate Just Like The Rest Of Us

Cyber Humor: Fundamentally, hackers operate just like the rest of us

Fundamentally, hackers operate just like the rest of us: they want to maximize their return on investment. They may even use the same type of cost-benefit analyses you and your business regularly employ – even if their ultimate goals are less ethical. Still, the bottom line is that increasing the cost of attacking your organization […]

I Know What You Did Last Summer!

Cyber Humor: I know what you did last summer

The longer the hacker spends collecting data about people and systems within the company, the more likely he or she is to succeed. In the reconnaissance phase of an attack, hackers identify a vulnerable target and explore how to exploit it. The initial target can be anyone within the organization. They only need a single […]

Rely Less on Vulnerability Management

ENHALO Network Segmentation Service Comic

Network segmentation is a powerful but underutilized security measure, yet it is one of the cornerstones of a successful information security program. Agent-Based Solutions Prove Disadvantageous Installing agent software on computing instances for network segmentation can be a headache for companies seeking to protect high-value assets. The disadvantages of an agent-based segmentation approach in network […]

The Perfect Time for Phishing Emails

Cyber Hunour - email spam campaign.

It’s a New Year, and there’s an uptick in subscription renewal scams.  Although subscription renewal scams are old identity theft methods, the beginning of a new year is the perfect time for phishing emails claiming, “it’s time to renew your annual subscription”.  Take the latest “Norton Subscription will renew today” email. The fraudulent emails that […]

Talk about fatal love!

Cyber Humor: Cyber Threats

Viruses, hearts, and chocolates? Cyber threats are just as common as Valentine’s Day jewellery, dining, and gifts. Spammers and scammers alike use the 14th of February as a chance to lure people into opening phishing emails or downloading malicious files. And if one user clicks on the wrong lovey-dovey message, you could be in for […]

Checks for the Credibility of a SOC Vendor

Cyber Humour SOC protocols

Although we assume our cybersecurity vendor is highly competent, secure, and effective, we should not forget those vendors also have vendors.  Checks for the credibility of a SOC vendor:

Cyber Monday…

son of a breach - cyber Monday

It’s a busier time, and more money is flowing through systems, so attackers target businesses hoping that the transaction surge will serve as a smokescreen. In particular, ransomware and other types of malware are a concern for businesses around this time of the year. Cyber Monday scams come in many forms as they lure you […]

Are my business credentials on the dark web?

son of a breach - business credential on dark web

Wondering if your business credentials are on the dark web? Unfortunately, yes. “Of all the organizations we’ve helped, we’ve yet to find one that hasn’t come up on the dark web”, Carol Watson, Director, Sales & Operations US. There’s more to this story – read The Dark Web Reality Check 

Pass-The-Hash Techniques Can Fool a Target System

Enhalo-comic28b_online leak site run by hive threat actors

An online leak site run by hive threat actors, accessible through a .onion address, targets ransomware victims with the intention of ‘naming and shaming’ them. In addition, the malware operators practice double extortion, which involves stealing sensitive corporate data from a victim organization before encrypting the disk. In the event a victim does not pay […]

We All Deserve A Safe Journey!

Enhalo-comic27_the job of the cybersecurity industry

Imagine an automobile manufacturer just giving you a seatbelt and stopping there. No airbags, steel reinforced doors, or engine compartments are included in your purchase – none of the safety features that need to be built into the vehicle. These “obvious” features need to be the focus of cybersecurity by design so customers do not […]

Have You Hired The Best Cyber Agent?

son of a breach cyber agent comic

Pay for the pleasure of not watching! Almost any big-budget movie is accompanied by the appearance of fake websites offering free viewings and even downloads. Fans who try to watch or download the long-awaited film are redirected to a legit-looking “Columbia Pictures” splash screen. After a few seconds, the broadcast stops, and a request to […]

Outdated Operating Systems are Open to Attack

outdated operating systems cause havoc cybersecurity comic

The industrial control systems that water districts use to manage valves, pipes, and other infrastructure are notoriously open to attack. The most common vulnerabilities: remote-access networks, obvious passwords, and software so old that the manufacturer had stopped making fixes to protect against intruders.  The worst part – an IBM study found that vulnerabilities are known […]

ENHALO takes climate change seriously

Cyber Comic Climate Positive

All our hosting partners have not only been offset from a carbon perspective until 2030, but we’ve also purchased carbon credits to overcompensate so we can ensure we are capturing carbon and reversing climate change.  We feel that carbon neutrality is not enough, therefore, we go the extra mile to reverse the damage that we […]

What Happened To Watertight Security!?

son-of-a-breach - cyberhumor-10

Cyber supply chain risks touch sourcing, vendor management, supply chain continuity and quality, transportation security, and many other functions across the enterprise that require a coordinated effort to address. Cyber Supply Chain Security Principles

Stop Ransomware in its Tracks

stop ransomware webinar thumbnail

If you have a Zero Trust segmentation project in mind, but the agent-based solutions are putting you off… you can’t afford to miss this session with our partners AirGap.

If It Sounds Too Good To Be True, It Is

son-of-a-breach - cyberhumor-12

With sophisticated scammers, fraudsters, and impersonators everywhere… if it sounds too good to be true, it probably is.  While there is nothing wrong with our craving for good deals, we must keep in mind that there are always cybercriminals who will try to lure us into believing a hoax deal is a great opportunity. Black […]

Don’t Fall For The Latest Fad!

son-of-a-breach - cyberhumor-11

Even when there’s no evidence that a cyber product works, enterprises are now willing to spend more than ever on security while their existing cybersecurity solutions are not being fully used. Cybersecurity is not a one-time product implementation, but an overall approach to building a resilient cyber defense. 

Coral Commerce Case Study

ENHALO Cyber Case Studies

Transitioned to cloud (AzureSQL) and PCI DSS certification to secure and maintain online business and lower cost and carbon footprint. Coral Commerce specializes in online payments. We look after retailers that do business online, managing their digital payments. Therefore, we are subject to the Data Industry Security Standard commonly referred to as PCI DSS. As […]

Only Your Friends Use The Door!

son-of-a-breach - cyberhumor-10

Organizations understand the risks of insufficient cybersecurity and have invested heavily in technological tools to counter the threats. BUT focus on tools over process is a high-tech version of assemble-it-yourself furniture without the instructions. The result is breaches due to all the gaps that occur, because tools alone, aren’t security.

Safe River Crossing?

son-of-a-breach - cyberhumor-9

This crocodile will eat again and again… because many still think he carries wood! Those who have not learned from security mistakes are condemned to repeat them… Matthew Henry once said: A danger discovered is half prevented.

You’ve been compromised!

You’ve been compromised! Through social engineering, attackers take advantage of human curiosity, fear and gullibility to manipulate their victims. They even take advantage of your fear of being compromised in order to actually compromise you!

Cybersecurity budget

Our cybersecurity budget is 2.5% of the company’s overall budget! Why do we still get hit with ransomware attacks?!!!

What the FUD? 

What the FUD?  94% of malware is delivered by email and trojans account for 58% of all computer malware.

No more snake oil

No more snake oil, stop ransomware with the basics. Firewall rules and air gaping, patching, and restore-able backups – speak to ENHALO to find out how!

Selling you more products

If your security partner’s only solution to a data breach is selling you more products related to the ones you already have… run a mile in the other direction! 

Products over process

Products over process = breaches due to all the gaps that occur, because products alone, aren’t security.

Scare customers into buying a magic box

AI coupled with machine learning, next-generation, integrated, scare tactic that is powered by the DarkWeb to generate manager porn reports that bounce off Starlink satellites to scare the customers into buying a magic box that keeps them 100% secure whilst using military-grade encryption to keep all data and users secure, whilst reducing their technical security […]

Steps To Keep Your SME Cyber Safe

keep sme cybersafe podcast thumbnail

Africa Business Radio – Breakfast Show | Gerhard Conradie, ENHALO Co-Founder and Global Head of Solutions Architecture, discusses how SMEs should navigate their cybersecurity.

Cyberattack Emergency

Are you experiencing an active cyberattack?

Get rapid response.

Call ENHALO’s International SOS no:
For Other Inquiries: