Cybersecurity Awareness & Compliance Training – That’s Bob’s Business

Melanie Oldham Founder and CEO of her UK Yorkshire-based firm Bob’s Business got a boost as a result of success in a high-profile competition inspired by the Duke of York, who is chancellor of the University of Huddersfield.

Bob’s Business is a company specialising in cyber security awareness that helps organisations become more secure and compliant in cyber security and GDPR using eLearning has won a UK Royal Competition. 

An estimated 500,000 people have now taken the online courses offered by Bob’s Business, which currently has 36 modules available online teaching employees how to keep information systems secure and to be on guard against the whole gamut of threats, including phishing attacks.

The business has 36 training courses which use a combination of engaging course content, infographics and animation to equip employees with essential cyber security knowledge with subjects from how to detect phishing emails to GDPR compliance training.

At the closing session, The Duke announced that the three top pitches were from Huddersfield-based Bob’s Business, which provides cyber security training; Memento, which has developed a process for creating 4D virtual reality images by stitching together pictures from smartphones; and Spatialize, which has developed a ring, worn on the finger, that allows interaction with augmented reality technology.

The university was the venue for the latest round of the duke’s Pitch@Palace events. A wide range of high-calibre businesses made their pitch for support, with the most successful ventures moving on to the next phase of the contest which will culminate in a final at the palace.

Melanie Oldham is founder and chief executive of Bob’s Business, which doubled its sales and staffing levels for the past three years and now has 29 full-time members of staff.

Clients for its animated cyber security training modules ranges from SMEs to the likes of retailers like JD Williams and the Co-op Group as well as Government agencies.

Despite the success of the business, which was formed in 2007 and began employing full-time staff in 2012, Melanie said she was still alert to opportunities that could provide an extra fillip.

Melanie, who delivered a three-minute presentation to the Pitch@Palace judges, said: “We have managed to grow very organically so we did not get to the next stage of Pitch@Palace because we were asking for money,” said Melanie. “They all said on the judging panel that they felt they could help grow the business.”

Melanie, who worked for the Huddersfield-based Mid Yorkshire Chamber of Commerce before launching her cyber security enterprise, found out about the Huddersfield round of Pitch@Palace by a circular at the university’s 3M Buckley Innovation Centre.

So who is Bob? He is a symbolic “everyman” figure who pops up in the company’s animations.

“Everybody can relate to him because everybody goes through the pain that Bob goes through. They understand it and face the same risks, regardless of what type of industry they are in,” said Melanie, adding that the figure of Bob is based on one of the first security professionals she worked with.

Melanie’s background was in hospitality and tourism, but when she moved into project management she was asked by her boss to take charge of an information security project, introducing her to the topic that would be the basis of her own business.
About 90% of security breaches are down to human error. Melanie said Bob’s Business tried to minimise the risk by reinforcing precautionary behaviour, but putting over the message in an entertaining way without instilling a fear factor.

The significance of cyber security has burgeoned massively since she started out in 2007, with more and more competitors entering the field.

One of the ways that Melanie aims to stay ahead of the curve is by commissioning research, including a planned project with the University of Huddersfield that will look at the criminal psychology behind phishing.

West Yorksire Lieutenancy:     Huddersfield Examiner

You Might Also Read: 

What Your Board Needs To Know About GDPR:

The Pitfalls Of GDPR & Cyber Security For Micro Organisations:

 

« Android Abuse: EU Fines Google $5.1 Billion
Cyber Threat Warnings ‘Blinking Red’ »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Wisegate

Wisegate

Wisegate is a community of IT experts providing advisory services on all areas of IT including security.

IX Associates

IX Associates

IX Associates is a UK based IT Integration business specialising in risk, compliance, eDefence, and network security solutions.

Protegrity

Protegrity

Protegrity is an enterprise and cloud data security software for data-centric encryption and tokenization to protect sensitive data while maintaining usability.

AVR International

AVR International

AVR educate, advise, analyse and provide professional, technical consultancy and support to ensure your business is safe, compliant and protected.

IoT Now

IoT Now

IoT Now explores the evolving opportunities and challenges facing CSPs, and we pass on some lessons learned from those who have taken the first steps in next gen IoT services.

Sasa Software

Sasa Software

Sasa Software is a cybersecurity software developer specializing in the prevention of file-based network attacks.

Block Armour

Block Armour

Block Armour is a Mumbai and Singapore based venture focused on harnessing emerging technologies to counter growing Cybersecurity challenges in bold new ways.

Ogasec

Ogasec

Ogasec is a cybersecurity company formed by the merger between Aker and N-Stalker in 2017. Solutions include Security & Connectivity Networking, Application Security, and Managed Security Services.

ReFoMa

ReFoMa

ReFoMa is a consultancy and advisory company with a focus on information Security.

Zuratrust

Zuratrust

Zuratrust provide protection for all kinds of email related cyber attacks.

Ntirety

Ntirety

Ntirety Managed Security Services offer enterprise businesses the advanced tools, processes, and support to ensure your infrastructure, networks, and mission-critical applications are secure.

TechStak

TechStak

TechStak is the easiest way for businesses to find and connect with IT Pros and other technology solution providers in their area.

Nucleus Security

Nucleus Security

Nucleus is a leading Vulnerability Management platform for Large Enterprises, MSPs/MSSPs, and Application Security Teams that want more from their vulnerability management tools.

JanBask Training

JanBask Training

JanBask Training is a dynamic, highly professional, global online training provider committed to propelling the next generation of technology learners with a whole new way of training experience.

Epic Machines

Epic Machines

Epic Machines is a Value Added Reseller and Managed Security Services provider offering Security Transformation using Cloud-native solutions to commercial and government markets.

SecurWeave

SecurWeave

SecurWeave's Configurable Hardware Enforced Safety and Security (CHESS) platform has been designed to meet the security and safety criticality needs of the evolving digital industry.