Cybersecurity Awareness & Compliance Training – That’s Bob’s Business

Melanie Oldham Founder and CEO of her UK Yorkshire-based firm Bob’s Business got a boost as a result of success in a high-profile competition inspired by the Duke of York, who is chancellor of the University of Huddersfield.

Bob’s Business is a company specialising in cyber security awareness that helps organisations become more secure and compliant in cyber security and GDPR using eLearning has won a UK Royal Competition. 

An estimated 500,000 people have now taken the online courses offered by Bob’s Business, which currently has 36 modules available online teaching employees how to keep information systems secure and to be on guard against the whole gamut of threats, including phishing attacks.

The business has 36 training courses which use a combination of engaging course content, infographics and animation to equip employees with essential cyber security knowledge with subjects from how to detect phishing emails to GDPR compliance training.

At the closing session, The Duke announced that the three top pitches were from Huddersfield-based Bob’s Business, which provides cyber security training; Memento, which has developed a process for creating 4D virtual reality images by stitching together pictures from smartphones; and Spatialize, which has developed a ring, worn on the finger, that allows interaction with augmented reality technology.

The university was the venue for the latest round of the duke’s Pitch@Palace events. A wide range of high-calibre businesses made their pitch for support, with the most successful ventures moving on to the next phase of the contest which will culminate in a final at the palace.

Melanie Oldham is founder and chief executive of Bob’s Business, which doubled its sales and staffing levels for the past three years and now has 29 full-time members of staff.

Clients for its animated cyber security training modules ranges from SMEs to the likes of retailers like JD Williams and the Co-op Group as well as Government agencies.

Despite the success of the business, which was formed in 2007 and began employing full-time staff in 2012, Melanie said she was still alert to opportunities that could provide an extra fillip.

Melanie, who delivered a three-minute presentation to the Pitch@Palace judges, said: “We have managed to grow very organically so we did not get to the next stage of Pitch@Palace because we were asking for money,” said Melanie. “They all said on the judging panel that they felt they could help grow the business.”

Melanie, who worked for the Huddersfield-based Mid Yorkshire Chamber of Commerce before launching her cyber security enterprise, found out about the Huddersfield round of Pitch@Palace by a circular at the university’s 3M Buckley Innovation Centre.

So who is Bob? He is a symbolic “everyman” figure who pops up in the company’s animations.

“Everybody can relate to him because everybody goes through the pain that Bob goes through. They understand it and face the same risks, regardless of what type of industry they are in,” said Melanie, adding that the figure of Bob is based on one of the first security professionals she worked with.

Melanie’s background was in hospitality and tourism, but when she moved into project management she was asked by her boss to take charge of an information security project, introducing her to the topic that would be the basis of her own business.
About 90% of security breaches are down to human error. Melanie said Bob’s Business tried to minimise the risk by reinforcing precautionary behaviour, but putting over the message in an entertaining way without instilling a fear factor.

The significance of cyber security has burgeoned massively since she started out in 2007, with more and more competitors entering the field.

One of the ways that Melanie aims to stay ahead of the curve is by commissioning research, including a planned project with the University of Huddersfield that will look at the criminal psychology behind phishing.

West Yorksire Lieutenancy:     Huddersfield Examiner

You Might Also Read: 

What Your Board Needs To Know About GDPR:

The Pitfalls Of GDPR & Cyber Security For Micro Organisations:

 

« Android Abuse: EU Fines Google $5.1 Billion
Cyber Threat Warnings ‘Blinking Red’ »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Radiant Logic

Radiant Logic

Radiant Logic is a market-leading provider of federated identity solutions based on virtualization, and delivers simple, logical, and standards-based access to all identities within an organization.

Planit Testing

Planit Testing

Planit is a leader in Quality Assurance and a specialist in software testing and training services.

Skkynet Cloud Systems

Skkynet Cloud Systems

Skkynet is a leader in real-time data systems for the secure management and control of industrial processes (SCADA) and embedded devices (M2M).

IT Security House

IT Security House

IT Security House is a leading European supplier of Cyber Security Intelligence and eCrime services.

Cyber Exchange

Cyber Exchange

Cyber Exchange provides a focal point for UK organisations connected with, or with an interest in, cyber security to connect, engage and collaborate.

Bechtel

Bechtel

Bechtel’s Industrial Control Systems Cyber Security Laboratory focuses on protecting large-scale industrial and infrastructure systems that support critical infrastructure.

Awen Collective

Awen Collective

Awen Collective develops software-based tools for performing Digital Forensics, Incident Response and Cyber-Crime Investigation.

Salt Communications

Salt Communications

Salt communications is a global leader in secure communications. Our bespoke platform is the secure communications solution that uniquely gives complete control to our customers.

Plurilock Security Solutions

Plurilock Security Solutions

Plurilock is a real-time cybersecurity solution that uses artificial intelligence to identify, prevent, and eliminate insider threats.

CRI4DATA

CRI4DATA

CRI4DATA's mission is to help organizations build their resilience to cyber risk.

ITRecycla

ITRecycla

ITRecycla are specialists in the protection of sensitive computer data by data destruction, re-marketing of reusable computer equipment, computer recycling and disposing of electronic e-waste.

Conference Index

Conference Index

Conference Index provides an indexed listing of upcoming meetings, seminars, congresses, workshops, summits and symposiums across a wide range of subjects including Cybersecurity.

JupiterOne

JupiterOne

JupiterOne is the security product that is changing how organizations manage and secure their software defined assets.

CodeHunter

CodeHunter

CodeHunter is a malware hunting SaaS platform designed to detect all variations of malware, known and unknown, without the need for source code or signatures.

Protectt.ai Labs

Protectt.ai Labs

Protectt.ai Labs is India’s first mobile security start up building awareness & providing solutions for mobile app, device & transaction security.

System360

System360

System360 is one of Houston's top suppliers of network administration, design, security, and support services.