Cyber security for small businesses in Australia Image
November 26, 2025 Cyber security for small businesses in Australia

Cyber security for small businesses is no longer a “nice to have”, it’s a must. But where do you beg…

Custom vs Off-the-Shelf Cyber Security Services for Small Business: What’s Right for You? Image
September 24, 2025 Custom vs Off-the-Shelf Cyber Security Services for Small Business: What’s Right for You?

Small businesses are increasingly targeted by cyber threats, and that makes cyber security services …

How attackers exploit human nature: Social engineering cyber security examples explained Image
August 27, 2025 How attackers exploit human nature: Social engineering cyber security examples explained

Not sure whether to hire a scissor lift or a boom lift? This guide walks you through the different t…

CAPTCHA Scams and Phishing Scams: What You Need to Know Image
August 22, 2025 CAPTCHA Scams and Phishing Scams: What You Need to Know

You’ve seen a CAPTCHA before — those “I’m not a robot” checkboxes or image puzzles designed to block…

What to do if you’re caught in a data breach Image
July 3, 2025 What to do if you’re caught in a data breach

It’s an all too familiar feeling. You hear that a company you trust has suffered a data breach, and …

Phishing Resilience for SMBs Image
June 26, 2025 Phishing Resilience for SMBs

Phishing attacks remain one of the most pressing cyber threats facing small and medium businesses (S…

Phishing and Protecting Privacy Image
June 17, 2025 Phishing and Protecting Privacy

Privacy is not just about personal information; it’s information that can be business critical.…

Understanding AiTM and MitM Attacks Image
June 4, 2025 Understanding AiTM and MitM Attacks

A lot of our security awareness training is centred around phishing, and for good reason - it's stil…

What is Business Email Compromise (BEC) – and how can you protect your organisation? Image
May 20, 2025 What is Business Email Compromise (BEC) – and how can you protect your organisation?

Business Email Compromise (BEC) can be one of the most financially damaging types of phishing attack…

Why Phishing Email Training is Critical to Human Risk Image
May 9, 2025 Why Phishing Email Training is Critical to Human Risk

Phishing emails are sneaky messages designed to trick employees into handing over sensitive informat…

Phriendly Phishing Logo