Trading Authority for Security: The CEO’s Dilemma
![This comic illustrates a real-world issue many executives face.](https://x6vb05.n3cdn1.secureserver.net/wp-content/uploads/2024/07/Enhalo-comic64b-1024x1024.jpg)
Learn how robust cybersecurity measures can protect your business without compromising control. Read more about the CEO’s dilemma in our ‘Son of a Breach’ comic series.”
Simplifying Cybersecurity: Bridging the Gap Between Tech Speak and Business Insight
![Bridge the communication gap on cyber risk](https://x6vb05.n3cdn1.secureserver.net/wp-content/uploads/2024/05/Enhalo-comic62b-1024x1024.jpg)
How does bridging the communication gap between cybersecurity tech speak and business insights enhance decision-making and safeguard digital assets?
Lost in Translation: Bridging the Cybersecurity Communication Gap
![Lost in Translation: Bridging the Cybersecurity Communication Gap](https://x6vb05.n3cdn1.secureserver.net/wp-content/uploads/2024/05/Enhalo-comic61b-1024x1024.jpg)
Discover how simplifying complex cyber terms into strategic insights can enhance corporate security. Bridging the communication gap between cybersecurity experts and non-technical executives.
Tools evolve, techniques refine, but some hacking basics? Timelessly divine!
![Some hacking basics have not changed over the years.](https://x6vb05.n3cdn1.secureserver.net/wp-content/uploads/2024/04/Enhalo-comic59b-1024x1024.jpg)
Amidst the high-tech arms race of defenses and attacks, there lies an immutable truth: the most fundamental hacking tactics remain as effective as ever.
Fly Under The Threat Radar: The Optimal Safety Zone
![Fly under the threat radar - the optimal safety zone](https://x6vb05.n3cdn1.secureserver.net/wp-content/uploads/2024/04/Enhalo-comic58b-1024x1024.jpg)
It’s an unfortunate reality that a company’s commitment to cybersecurity often goes unrecognised by the wider public unless a significant failure thrusts it into the spotlight.
Hitting the Jackpot: A Cybersecurity Comic with a Twist
![When ransomware hits the jackpot](https://x6vb05.n3cdn1.secureserver.net/wp-content/uploads/2024/02/Enhalo-comic65b-1024x1024.jpg)
Cybersecurity vigilance is the only bet worth making, ensuring that when ransomware tries to play the odds, it finds no luck in our domain.
The Perils of the ANY-ANY Condition: A Cautionary Comic Tale
![Someone forgot to deactivate the ANY-ANY condition!](https://x6vb05.n3cdn1.secureserver.net/wp-content/uploads/2024/02/Enhalo-comic63b-1024x1024.jpg)
Explore the infamous ANY-ANY condition through our latest comic, highlighting the delicate balance between convenience and security risks.
The Holistic Approach to Cybersecurity: Beyond Just Tools and Products
![Enhalo-cyber-comic](https://x6vb05.n3cdn1.secureserver.net/wp-content/uploads/2024/02/Enhalo-comic57b-1024x1024.jpg)
In cybersecurity, traditional strategies often fall short, akin to the incomplete task of attempting to cleanse hands with soap but no water.
Beware of Geeks Bearing Gifts: Casinos are Prime Targets
![Cyber Comic: The Trojan Horse](https://x6vb05.n3cdn1.secureserver.net/wp-content/uploads/2024/01/Enhalo-comic66b-1024x1024.jpg)
The Trojan Horse, a timeless symbol of deceptive defeat, is now a “Vendor Update” – but instead of soldiers, it’s loaded with ransomware, ready to compromise the house! Remember, in the casino of cybersecurity, there’s no jackpot for being an easy target.
Happy Holidays from all of us at ENHALO
![Cyber Comic: Festive Season Wishes](https://x6vb05.n3cdn1.secureserver.net/wp-content/uploads/2024/01/Enhalo-comic68b-1024x1024.jpg)
As the festive season brings joy, warmth, and cheer, we want to extend our heartfelt gratitude to you for your continued trust in our cybersecurity services.
Ho-Ho-Hold On To Your Data!
![Cyber Comic: Unauthorized Access Festive Season](https://x6vb05.n3cdn1.secureserver.net/wp-content/uploads/2023/12/Enhalo-comic67b-1024x1024.jpg)
As the holiday season approaches, it’s a time of joy, celebration, and heightened vigilance in the world of cybersecurity. At ENHALO, we embrace the festive spirit with a crucial reminder for all businesses: Ho-ho-hold on to your data!
How Can One Tiny Email Attachment Cause So Much Trouble?
![Enhalo Comic focussing on the risks of email attachments.](https://x6vb05.n3cdn1.secureserver.net/wp-content/uploads/2023/11/Enhalo-comic53b_email-attachment-1024x1024.jpg)
Curiosity often whispers,”What’s the harm in just opening it? I’ll be cautious”. The very notion that an email holds an enticing piece of info – tempting.
SOC – Security Operations Center Is Not Working As It Should
![SOC - Security Operations Center is not working as it should.](https://x6vb05.n3cdn1.secureserver.net/wp-content/uploads/2023/11/Enhalo-comic54b_SOC-not-working-1024x1024.jpg)
The security analysts, with their trusty coffee mugs and tired eyes found themselves caught in a never-ending loop of false alarms.
Racing Towards Cybersecurity Excellence at the UK Grand Prix!
![Son of a Breach Enhalo Cyber Humour - cybersecurity at the races](https://x6vb05.n3cdn1.secureserver.net/wp-content/uploads/2023/07/Enhalo-comic56b-1024x1024.jpg)
As the world’s top drivers compete for victory on the track, let’s not forget the parallel race happening in the digital realm.
Game, Set, Cybersecurity!
![Son of a Breach Enhalo Comic 55 - Wimbledon empire has a new security job](https://x6vb05.n3cdn1.secureserver.net/wp-content/uploads/2023/07/Enhalo-comic55b-1024x1024.jpg)
Just as an umpire ensures fair play and enforces the rules at Wimbledon, cybersecurity is the guardian of your digital court.
If you don’t give your company’s data security enough attention, the bad guys will
![Unprotected data. Comic about not giving your company's data security enough attention, while the bad guys are.](https://x6vb05.n3cdn1.secureserver.net/wp-content/uploads/2023/11/Enhalo-comic29b-1024x1024.jpg)
Recent statistics paint a stark picture in cybercrime costs, with projections reaching $10.5 trillion annually by 2025, growing at 15% per year (Cybersecurity Ventures report).
Companies Are Hacked Because of Mistakes Individuals Keep Making
![Cybersecurity Humor: companies are hacked because of mistakes individuals keep making](https://x6vb05.n3cdn1.secureserver.net/wp-content/uploads/2023/05/Enhalo-comic45b-1024x1024.jpg)
Most of the time, companies are hacked because of mistakes individuals keep making. Not because you, or anyone else is stupid, but because cyber criminals are clever and despite the increasing awareness of cyber risks, people often underestimate the potential consequences of their actions and overlook simple security measures.
Streamlining Security Operations: The Case for Integrated Solutions
![Son of a Breach Enhalo Comic 25 - use duct tape to get security tools to work together](https://x6vb05.n3cdn1.secureserver.net/wp-content/uploads/2023/07/Enhalo-comic25b-1024x1024.jpg)
“Security buyers often have dozens of different tools from multiple vendors, and generally have to use a fair amount of duct tape to get them to work together.”
Zero Trust Architecture
![Son of a Breach Enhalo Comic - zero trust architecture](https://x6vb05.n3cdn1.secureserver.net/wp-content/uploads/2023/07/Enhalo-comic26b-1024x1024.jpg)
No security defense is guaranteed to prevent supply chain attacks, but you cannot operate in blind faith.
Hackers Operate Just Like The Rest Of Us
![Cyber Humor: Fundamentally, hackers operate just like the rest of us](https://x6vb05.n3cdn1.secureserver.net/wp-content/uploads/2023/05/Enhalo-comic24b-1024x1024.jpg)
Fundamentally, hackers operate just like the rest of us: they want to maximize their return on investment. They may even use the same type of cost-benefit analyses you and your business regularly employ – even if their ultimate goals are less ethical.
I Know What You Did Last Summer!
![Cyber Humor: I know what you did last summer](https://x6vb05.n3cdn1.secureserver.net/wp-content/uploads/2023/05/Enhalo-comic22b-1024x1024.jpg)
The longer the hacker spends collecting data about people and systems within the company, the more likely he or she is to succeed. Getting to know the target is the whole point.
Rely Less on Vulnerability Management
![ENHALO Network Segmentation Service Comic](https://x6vb05.n3cdn1.secureserver.net/wp-content/uploads/2023/03/Enhalo-comic21b-1024x1024.jpg)
Network segmentation is a powerful but underutilized security measure, yet it is one of the cornerstones of a successful information security program.
The Perfect Time for Phishing Emails
![Cyber Hunour - email spam campaign.](https://x6vb05.n3cdn1.secureserver.net/wp-content/uploads/2023/03/COMIC-20-Enhalo-comic20b-1024x1024.jpg)
Although subscription renewal scams are old identity theft methods, the beginning of a new year is the perfect time for phishing emails claiming, “it’s time to renew your annual subscription”.
Take the latest “Norton Subscription will renew today” email.
Talk about fatal love!
![Cyber Humor: Cyber Threats](https://x6vb05.n3cdn1.secureserver.net/wp-content/uploads/2023/05/Enhalo-comic23b-1024x1024.jpg)
Viruses, hearts, and chocolates? Cyber threats are just as common as Valentine’s Day jewellery, dining, and gifts.
Checks for the Credibility of a SOC Vendor
![Cyber Humour SOC protocols](https://x6vb05.n3cdn1.secureserver.net/wp-content/uploads/2023/03/COMIC-19-Enhalo-comic19b-1024x1024.jpg)
Although we assume our cybersecurity vendor is highly competent, secure, and effective, we should not forget those vendors also have vendors.
Cyber Monday…
![son of a breach - cyber Monday](https://x6vb05.n3cdn1.secureserver.net/wp-content/uploads/2022/11/COMIC-18.png?time=1721911129)
Regardless of the form they take, all Cyber Monday scams are meant to trick people into forfeiting their personal and/or financial data.
Are my business credentials on the dark web?
![son of a breach - business credential on dark web](https://x6vb05.n3cdn1.secureserver.net/wp-content/uploads/2022/11/COMIC-17-1024x1024.jpg)
Wondering if your business credentials are on the dark web?
Pass-The-Hash Techniques Can Fool a Target System
![Enhalo-comic28b_online leak site run by hive threat actors](https://x6vb05.n3cdn1.secureserver.net/wp-content/uploads/2022/06/Enhalo-comic28b-1024x1024.jpg)
Pass-The-Hash techniques can fool a target system into launching authenticated sessions on a network without the need to crack a password.
We All Deserve A Safe Journey!
![Enhalo-comic27_the job of the cybersecurity industry](https://x6vb05.n3cdn1.secureserver.net/wp-content/uploads/2023/08/Enhalo-comic27b-1024x1024.jpg)
As car manufacturers prioritise passenger safety, the cybersecurity industry must ensure digital safety. On a vast internet highway, we deserve a safe journey.
Have You Hired The Best Cyber Agent?
![son of a breach cyber agent comic](https://x6vb05.n3cdn1.secureserver.net/wp-content/uploads/2022/09/COMIC-16-1024x1024.jpg)
Almost any big-budget movie is accompanied by the appearance of fake websites offering free viewings and even downloads.
Outdated Operating Systems are Open to Attack
![outdated operating systems cause havoc cybersecurity comic](https://x6vb05.n3cdn1.secureserver.net/wp-content/uploads/2022/08/COMIC-15-1024x1024.jpg)
The industrial control systems that water districts use to manage valves, pipes, and other infrastructure are notoriously open to attack.
ENHALO takes climate change seriously
![Cyber Comic Climate Positive](https://x6vb05.n3cdn1.secureserver.net/wp-content/uploads/2022/08/COMIC-14-1024x1024.jpg)
We feel that carbon neutrality is not enough, therefore, we go the extra mile to reverse the damage that we all have done to the planet.
What Happened To Watertight Security!?
![son-of-a-breach - cyberhumor-10](https://x6vb05.n3cdn1.secureserver.net/wp-content/uploads/2022/03/COMIC-13-1024x1024.jpg)
Cyber supply chain risks touch sourcing, vendor management, supply chain continuity and quality, transportation security, and many other functions across the enterprise that require a coordinated effort to address.
Stop Ransomware in its Tracks
![stop ransomware webinar thumbnail](https://x6vb05.n3cdn1.secureserver.net/wp-content/uploads/2021/11/stop-ransomware-webinar-thumbnail2-1024x576.png)
Zero Trust Segmentation – if the agent-based solutions are putting you off… you can’t afford to miss this session with our partners AirGap.
If It Sounds Too Good To Be True, It Is
![son-of-a-breach - cyberhumor-12](https://x6vb05.n3cdn1.secureserver.net/wp-content/uploads/2021/10/COMIC-12-1024x1024.jpg)
With Black Friday around the corner, scammers know legitimate businesses use the season to create a sense of urgency, with time-limited offers and low prices that are hard to turn down.
Don’t Fall For The Latest Fad!
![son-of-a-breach - cyberhumor-11](https://x6vb05.n3cdn1.secureserver.net/wp-content/uploads/2021/10/COMIC-11-1024x1024.jpg)
Even when there’s no evidence that a cyber product works, enterprises are now willing to spend more than ever on security while their existing cybersecurity solutions are not being fully used.
Coral Commerce Case Study
![ENHALO Cyber Case Studies](https://x6vb05.n3cdn1.secureserver.net/wp-content/uploads/2021/10/THUMBNAIL-ENHALO-Case-Study-Thumbnail-1024x615.png)
Transitioned to cloud (AzureSQL) and PCI DSS certification to secure and maintain online business.
Only Your Friends Use The Door!
![son-of-a-breach - cyberhumor-10](https://x6vb05.n3cdn1.secureserver.net/wp-content/uploads/2021/10/COMIC-10-1024x1024.png)
Focus on cyber tools over process is a high-tech version of assemble-it-yourself furniture without the instructions.
Safe River Crossing?
![son-of-a-breach - cyberhumor-9](https://x6vb05.n3cdn1.secureserver.net/wp-content/uploads/2021/10/COMIC-9-1024x1024.png)
Those who have not learned from security mistakes are condemned to repeat them…
You’ve been compromised!
![](https://x6vb05.n3cdn1.secureserver.net/wp-content/uploads/2021/07/COMIC-8-JUNE-2021.png?time=1721911129)
Through social engineering, attackers take advantage of human curiosity, fear and gullibility to manipulate their victims.
Cybersecurity budget
![](https://x6vb05.n3cdn1.secureserver.net/wp-content/uploads/2021/07/COMIC-7.png?time=1721911129)
Our cybersecurity budget is 2.5% of the company’s overall budget! Why do we still get hit with ransomware attacks?!!!
What the FUD?
![](https://x6vb05.n3cdn1.secureserver.net/wp-content/uploads/2021/07/COMIC-6.png?time=1721911129)
94% of malware is delivered by email and trojans account for 58% of all computer malware.
It’s not about new snake oil
![](https://x6vb05.n3cdn1.secureserver.net/wp-content/uploads/2021/07/COMIC-5.png?time=1721911129)
It’s not about new snake oil cybersecurity. Leverage your existing investments, speak to Enhalo to find out how.
No more snake oil
![](https://x6vb05.n3cdn1.secureserver.net/wp-content/uploads/2021/07/COMIC-4-APRIL-2021-1.png?time=1721911129)
No more snake oil, stop ransomware with the basics. Firewall rules and air gaping, patching and restore-able backups.
Selling you more products
![](https://x6vb05.n3cdn1.secureserver.net/wp-content/uploads/2021/07/sob-3.png?time=1721911129)
If your security partner’s only solution to a data breach is selling you more products related to the ones you already have… run away!
Products over process
![](https://x6vb05.n3cdn1.secureserver.net/wp-content/uploads/2021/07/sob-2.png?time=1721911129)
Products over process = breaches due to all the gaps that occur, because products alone, aren’t security.
Scare customers into buying a magic box
![](https://x6vb05.n3cdn1.secureserver.net/wp-content/uploads/2021/07/sob-1.png?time=1721911129)
Remove the #FearUncertaintyDoubt (#FUD) from your next cybersecurity purchasing decision and avoid the snake oils!
Steps To Keep Your SME Cyber Safe
![keep sme cybersafe podcast thumbnail](https://x6vb05.n3cdn1.secureserver.net/wp-content/uploads/2021/04/keep-sme-cybersafe-podcast-thumbnail-1-1024x576.png)
Africa Business Radio – Breakfast Show with Gerhard Conradie
Vulnerability Scan OR Penetration Test
![pentesting webinar thumbnail](https://x6vb05.n3cdn1.secureserver.net/wp-content/uploads/2021/04/pentesting-webinar-thumbnail2-1024x576.png)
Cybersecurity expert, Vishvas Nayi, demystifies these two cornerstones of every effective cyber strategy. It’s best to be prepared.