Cybersecurity Awareness & Compliance Training – That’s Bob’s Business

Melanie Oldham Founder and CEO of her UK Yorkshire-based firm Bob’s Business got a boost as a result of success in a high-profile competition inspired by the Duke of York, who is chancellor of the University of Huddersfield.

Bob’s Business is a company specialising in cyber security awareness that helps organisations become more secure and compliant in cyber security and GDPR using eLearning has won a UK Royal Competition. 

An estimated 500,000 people have now taken the online courses offered by Bob’s Business, which currently has 36 modules available online teaching employees how to keep information systems secure and to be on guard against the whole gamut of threats, including phishing attacks.

The business has 36 training courses which use a combination of engaging course content, infographics and animation to equip employees with essential cyber security knowledge with subjects from how to detect phishing emails to GDPR compliance training.

At the closing session, The Duke announced that the three top pitches were from Huddersfield-based Bob’s Business, which provides cyber security training; Memento, which has developed a process for creating 4D virtual reality images by stitching together pictures from smartphones; and Spatialize, which has developed a ring, worn on the finger, that allows interaction with augmented reality technology.

The university was the venue for the latest round of the duke’s Pitch@Palace events. A wide range of high-calibre businesses made their pitch for support, with the most successful ventures moving on to the next phase of the contest which will culminate in a final at the palace.

Melanie Oldham is founder and chief executive of Bob’s Business, which doubled its sales and staffing levels for the past three years and now has 29 full-time members of staff.

Clients for its animated cyber security training modules ranges from SMEs to the likes of retailers like JD Williams and the Co-op Group as well as Government agencies.

Despite the success of the business, which was formed in 2007 and began employing full-time staff in 2012, Melanie said she was still alert to opportunities that could provide an extra fillip.

Melanie, who delivered a three-minute presentation to the Pitch@Palace judges, said: “We have managed to grow very organically so we did not get to the next stage of Pitch@Palace because we were asking for money,” said Melanie. “They all said on the judging panel that they felt they could help grow the business.”

Melanie, who worked for the Huddersfield-based Mid Yorkshire Chamber of Commerce before launching her cyber security enterprise, found out about the Huddersfield round of Pitch@Palace by a circular at the university’s 3M Buckley Innovation Centre.

So who is Bob? He is a symbolic “everyman” figure who pops up in the company’s animations.

“Everybody can relate to him because everybody goes through the pain that Bob goes through. They understand it and face the same risks, regardless of what type of industry they are in,” said Melanie, adding that the figure of Bob is based on one of the first security professionals she worked with.

Melanie’s background was in hospitality and tourism, but when she moved into project management she was asked by her boss to take charge of an information security project, introducing her to the topic that would be the basis of her own business.
About 90% of security breaches are down to human error. Melanie said Bob’s Business tried to minimise the risk by reinforcing precautionary behaviour, but putting over the message in an entertaining way without instilling a fear factor.

The significance of cyber security has burgeoned massively since she started out in 2007, with more and more competitors entering the field.

One of the ways that Melanie aims to stay ahead of the curve is by commissioning research, including a planned project with the University of Huddersfield that will look at the criminal psychology behind phishing.

West Yorksire Lieutenancy:     Huddersfield Examiner

You Might Also Read: 

What Your Board Needs To Know About GDPR:

The Pitfalls Of GDPR & Cyber Security For Micro Organisations:

 

« Android Abuse: EU Fines Google $5.1 Billion
Cyber Threat Warnings ‘Blinking Red’ »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Code Decode Labs

Code Decode Labs

Code Decode Labs provides consulting for IT Technology, Cyber Security, Advanced Defense & Policing Technologies, Intelligent Networks, and Information Security.

Ikerlan

Ikerlan

Ikerlan is an R&D technology centre specialising in areas including embedded systems, industrial automation and industrial cybersecurity.

Grimm Cyber

Grimm Cyber

GRIMM makes the world a more secure place by increasing the cyber resiliency of our client’s systems, networks, and products.

Advisen

Advisen

Advisen is the leading provider of data, media, and technology solutions for the commercial property and casualty insurance market including cyber risk.

AppSec Labs

AppSec Labs

AppSec Labs specialise in application security. Our mission is to raise awareness in the software development world to the importance of integrating software security across the development lifecycle.

Cybersixgill

Cybersixgill

Cybersixgill was founded with a single mission: to protect organizations against malicious cyber attacks that come from the deep and dark web, before they materialize.

Inavate Consulting

Inavate Consulting

Inavate Consulting are experts in defining and implementing information assurance solutions and governance frameworks. Our ISO27001 consultants are the most experienced in the industry.

Enclave Networks

Enclave Networks

Our mission is to give IT professionals a simple way to rapidly build secure connectivity between any application, computer system, device or infrastructure - regardless of the underlying network.

Tapestry Technologies

Tapestry Technologies

Tapestry Technologies supports the Department of Defense in shaping its approach to cybersecurity.

Red River

Red River

Red River is a technology transformation company, bringing 25 years of experience and mission-critical expertise in analytics, cloud, collaboration, mobility, networking and security solutions.

Lumifi

Lumifi

Lumifi provide end-to-end cybersecurity resilience solutions with a specialty in managed detection and response (MDR) services.

Narf Industries

Narf Industries

Narf Industries are a small group of reverse engineers, vulnerability researchers and tool developers that specialize in tailored solutions for government and large enterprises.

Secjur

Secjur

Secjur is a provider of AI-based compliance tools that aim to put compliance, data protection, information security and whistleblowing on autopilot.

EPIQ Infotech

EPIQ Infotech

EPIQ Infotech is a trusted consulting and implementation partner for Oracle JD Edwards and Amazon Web Services (AWS).

Nortal

Nortal

Nortal is a strategic digital transformation partner for leading companies and governments around the world.

StackGen

StackGen

StackGen (formerly appCD) automatically generates Infrastructure from Code (IfC) based on application code with golden standards applied.