6 Ways To Promote Effective IT Security in the Workplace

One of the biggest challenges facing Chief Information Security Officers and IT Directors can be getting their workforce behind the idea of working in a cyber secure culture. This quick guide will help you hit the hardpoints home and protect your organisation from cyber threats. IT security is often thought of as a boring subject. This can cause your staff …

Move over Bob! – Bob’s Business undergoes a brand refresh

Cyber security training and compliance awareness course providers Bob’s Business is thrilled to announce that it is smartening up its image. Bob’s Business, the online cyber education company has recently refreshed it branding and the infamous Bob character that has appeared on the companies logo for the last 10 years has been axed! Bob’s Business uses a unique approach to …

Phishing employees in a positive light

By understanding the way users behave and approaching training exercises from an employee perspective, rather than an organisational one, you will revolutionise your security strategies. Today, email is the number one delivery method for ransomware and other malware. A study in 2015 by Intel Security shockingly revealed that 97% of people around the world are unable to identify a sophisticated phishing email. …

My Work Experience at Bob’s Business

Louis Jones, a Digital and Social Media Marketing student from the University of Huddersfield, spent one week at Bob’s Business. During his time with the company, he learned about how the business operates and gained hands-on experience and insights into the everyday day life of a cyber security marketer. Louis wasted no time getting involved with the marketing team and …

Cyber Security Blog

The Bob’s Business Infosecurity Europe review

Infosecurity Europe is one of the biggest global cyber security conferences and every year the event comes to London for its annual celebration of the best that the cyber security and technology sector has to offer. Bob’s Business made its 7th appearance at the prestigious cyber security event which is hosted at Olympia London over the course of 3 days. …

GDPR Training

GDPR deadline brought forward to 1st April 2018

GDPR deadline brought forward to 1st April 2018 Did you know that the deadline for the new General Data Protection Regulation (GDPR) has been brought forward by a month to the 1st of April 2018? This recent news has been confirmed… as an April Fools joke! Don’t fret it’s only a bit of harmless fun, the 25th of May 2018 …

Cyber Security Blog

The Grand National – How One Mistake Can Cost Everything

One of the most anticipated events in the sporting calendar is nearly here! Just over a month before the GDPR deadline, the Grand National serves as a reminder of how one mistake can cost everything in the run up to the finish line. Organisations can put in every measure and piece of software essential to making sure that the best …

Follow Bob on his travels throughout 2018

From the snowy hills of Sheffield to the sunny streets of San Francisco, Bob and the team have their suitcases and passports at the ready, for an action-packed 2018. In the forthcoming months, Bob’s Business is super excited to announce that we will be attending numerous events throughout the globe, including a 10,000 mile round trip to the USA. Take …

Apprenticeship Week at Bob’s Business

This week Bob and the team are celebrating National Apprenticeship Week. With a total of 491,300 apprenticeship starts between the academic year of 2016-2017, apprenticeships throughout the UK have become a popular framework of employment within organisations. Apprenticeships provide benefits not only to individuals looking to peruse and develop a new career path, but for businesses and the wider economy, with Bob’s Business being …

Times are changing. Gone are the days where our only security concern was making sure that our doors and windows were locked. Through the rise in technology and the growth of online activity, the manner in which we now work has redefined, putting not only our personal data at risk, but business data in jeopardy too. We often scrutinise the …

Catphishing or (How an angel with a bow and arrow isn’t always cupid)

Before we start, let’s get a common mistake out of the way. Apparently, there are two types of catfish related scams in the world. Catfishing and Catphishing. What a stark difference, right? Believe it or not, there is actually quite a substantial difference between the two, even though the spelling may suggest otherwise. Curious to know the difference? Here’s a …

The Commuters Mobile Working

The Commuter featuring Taken star, Liam Neeson, has recently been released in UK cinema screens. So you may be thinking, why is a cyber security training business writing a blog about Liam Neeson’s latest film release? For those of you that may be unaware, the film is set around the daily commute of insurance salesman’s Michael (Liam Neeson), whose journey …

What cyber security trends should we anticipate in 2018?

As 2018 draws nearer, it can only mean one thing; New Year’s Resolutions are on the agenda! Whether it’s starting the gym, consuming fewer alcoholic beverages, or even learning to play the Ukulele, we have the perfect New Year’s Resolution for you…To create a safer and more secure workplace. 2017 produced some notorious cyber security incidents, with organisations such as …

What cyber security trends should we anticipate in 2018?

As 2018 draws nearer, it can only mean one thing; New Year’s Resolutions are on the agenda! Whether it’s starting the gym, consuming fewer alcoholic beverages, or even learning to play the Ukulele, we have the perfect New Year’s Resolution for you…To create a safer and more secure workplace. 2017 produced some notorious cyber security incidents, with organisations such as …

GDPR: How will the new Data Protection law affect you?

GDPR; the one acronym that you can’t go a day without hearing in the information security and legal sectors. Replacing the current Data Protection Act (DPA), the General Data Protection Regulation (GDPR) is a way of standardising data protection laws across borders to ensure that everyone knows where they stand when sensitive data is shared, processed or disposed of. Coming …

Using mobile apps safely and securely

10 years ago if you had mentioned the word ‘application’, people would presume that you were talking about a job application or filling out a form. Yet in today’s ever insistent technological society, mention the word ‘application’ and people will presume you are referring to the apps that we install on our mobile devices. In the digital era that we …

2017: A year in review

2017 is the year in which cyber security didn’t just dip its toe into the mainstream, but it made its entrance into the pool of thought with a double tuck belly splash off the high dive. Organisations have finally woken up to the fact that security must be in place as the recovery costs from phishing attacks, ransomware infections or …

What cyber security trends should we anticipate in 2018?

As 2018 draws nearer, it can only mean one thing; New Year’s Resolutions are on the agenda! Whether it’s starting the gym, consuming fewer alcoholic beverages, or even learning to play the Ukulele, we have the perfect New Year’s Resolution for you…To create a safer and more secure workplace. 2017 produced some notorious cyber security incidents, with organisations such as …

What can we learn from the Uber hack?

The Uber hack is another notch in what has been a troublesome couple of months for the transportation technology company, Uber, after they had their license removed in London over failure to report and protect customers from sexual assault and the constant critiques on workplace culture and conditions. However, it was revealed on the 21st November that Uber covered up a data …

Is Black Friday just a gimmick for Cybercriminals to exploit?

Black Friday; the time of the year where shoppers wrestle for 50” 4k televisions, designer handbags or 10 ft teddy bears in an attempt to find the ‘bargain of the year’ and save money in anticipation for the expensive Christmas period. Originating from the United States, Black Friday is often referred to as the beginning of the Christmas shopping season, …

What is Identity Theft and how can I prevent it?

You wouldn’t reveal your personal information to a trick or treater, so why let a cyber criminal trick you into treating them this Halloween. Children sporting sinister Halloween masks may get rewarded with chocolate, money and the occasional uncherished tangerine, however, Identity Thieves attain much greater treats from their monstrous acts. Have you ever thrown away a bank receipt without …

Bob’s Business Supports Get Safe Online Week 2017

Bob’s Business is once again pleased to support ‘Get Safe Online Week’ in delivering and educating the UK with expert advice on staying safe online. This year’s campaign focuses on the problematic issue of “Phishing”. Take a read below to find out how Phishing can impact your organisation and what actions you can take to prevent it. Can you tell …

Cyber Security News Round Up – 18/08/17

In a review of the past week, we look at interesting news revolving our exciting and sometimes terrifying cyber security industry. Businesses such as Microsoft pay thousands for discovering vulnerabilities, the Scottish parliament falls victim to a cyber attack, leaked NSA exploits that target the SMB protocol cause havoc and Maersk is set to lose millions after an attack on …

Cyber Security News Round Up 11/08/17

In what has been another eventful and tumultuous week for our industry, we look back the news that has got us all talking over the past seven days. WannaCry ‘hero’ becomes ‘malware villain’ (or martyr, depending on your viewpoint), new fears of North Korean cyber attacks following hostile to and fro with the USA, and a hacker group is threatening to release their treasure trove of …

We’re supporting Cyber Security Challenge’s Boot Camp

Bob’s Business will be supporting the Cyber Security Challenge Boot Camp in Bristol. We will be hosting the pub quiz to the students who attend the event. Throughout the two-day event, students will be attending talks, panel sessions as well as various challenges. The purpose of this event is so that students, who are interested in the cyber world, gain …

WannaCry: A Wild Month in Cyber Security

If you thought politics has been a rollercoaster over the past couple of months, it is nothing compared to the world of cyber security during the past couple of weeks. To tap into my political reference repertoire, recent weeks in cyber haven’t been ‘strong and stable’ or the equivalent of ‘running through a field of wheat’. What we’ve seen is …

The Cyber Security People Pie

Firstly, those close to me know that when it comes to cooking I fit into both the ‘can’t cook’ and ‘won’t cook’ categories. So before I begin this piece, I feel it’s only right to omit that I soght the help of a real chef in the making of this flavoursome written dish! I am lead to believe, that to …

How will the new National Cyber Security Centre help tackle cybercrime?

Hacking your way to someone’s heart isn’t considered an effective seduction technique, but the cyber security sector were collectively swooned on Valentine’s Day by the launch of the National Cyber Security Centre. Sold as the UK’s cyber security awakening, the National Cyber Security Centre places innovation and education at the heart of the country’s strategy to reduce cybercrime. In a …

How will the new National Cyber Security Centre help tackle cybercrime?

Hacking your way to someone’s heart isn’t considered an effective seduction technique, but the cyber security sector were collectively swooned on Valentine’s Day by the launch of the National Cyber Security Centre. Sold as the UK’s cyber security awakening, the National Cyber Security Centre places innovation and education at the heart of the country’s strategy to reduce cybercrime. In a …

Don’t get phished this Christmas!

“During Q4 over the past three years, the number of unique phishing sites detected has increased each month but the number of phishing reports over the same time has declined” “Oh! What a wonderful time of the year”, as the song goes. Christmas is that occasion in the year that we all look forward to – time off work, spending …

Cyber Essentials: Simplified

We are proud to announce the launch of our new module, ‘Cyber Essentials’. Our new course prepares you for the accreditation process by breaking down the five main technical controls that make up the Cyber Essentials framework. ‘Cyber Essentials’ was developed in collaboration with IASME and The Friendly Nerd with the main aim of ensuring that your organisation is fully compliant with …

What can we learn from the Tesco Bank breach?

Over the weekend 40,000 Tesco Bank customers had their accounts compromised leading to 20,000 of those accounts losing money. Tesco Bank alerted customers via text with the message to review their accounts and report any suspicious activity and if any money was stolen, they would reimburse the money within ‘24 hours’. According to the Telegraph, the Tesco Bank fraud is …

Bob’s Brand New Cyber Security Hub

Bob’s Business is happy to showcase to the world the brand new ‘Bob’s Cyber Security Hub’. Over the past few weeks, Bob has been hard at work knocking through a few walls and giving the whole hub a new lick of paint to ensure that its visitors are in the most satisfying experience possible. Completely redesigned, Bob’s Cyber Security Hub …

Businesses must take Data Protection seriously

The Data Protection Act has got everyone talking and not for the right reasons – two high profile suspected breaches of the Act have taken place within a couple of days. Virgin Trains and Richard Branson have found themselves being investigated by with the Information Commissioner’s Office (ICO) after they released CCTV footage from one of their trains into the public …

Meet Dale

Bob might be the star of the show, but there is a team of committed professionals behind him that are making sure that everyone is getting the cyber security training they need. Meet Dale, Bob’s Business’ Customer Service Officer, who is your contact if you have any issues with Bob’s Business’ services. Name Dale Parrish Job Title Customer Support Officer …

Abi’s Work Experience

Bob’s Business is incredibly lucky to have four different students working at Bob’s Business over the month of August where they get a chance to gain work experience in the Cyber Security Field. Abigail Heron, who was interested in the design and creative aspects, walks us through her experience. Even though I’m not always the most confident person in the …

Walking Into The Unknown: Work Experience at Bob’s Business

Bob’s Business is incredibly lucky to have four different students working at Bob’s Business over the month of August where they get a chance to gain work experience in the CyberSecurity Field. Jack Riley, who was interested in the design and creative aspects, walks us through his experience. I would like to start of by saying a big thank you …

Ben’s Work Experience at Bob’s Business

Bob’s Business is incredibly lucky to have four different students working at Bob’s Business over the month of August where they get a chance to gain work experience in the Cyber Security Field. Ben Methley was here for two weeks, this is his experience. I was lucky enough to have the opportunity to work at Bob’s Business for two weeks …

Meet the Team: Heather

Bob might be the star of the show, but there are a team of committed professionals behind him that are making sure that everyone is getting the cyber security training they need. Meet Heather, Bob’s Business’ Operations Manager, who is committed to making sure that everything in the office is running as smoothly as possible. Name Heather Lord Job Title …

Sage Data Breach

Further to the announcement at the weekend, UK accounting software firm Sage have confirmed details on the breach of 280 accounts to the public. Alarm bells were raised by TheAntiSocialEngineer on Saturday 13th August. On Wednesday evening, a 32 year old female Sage employee was arrested by the City of London police at Heathrow Airport on suspicion of conspiracy to defraud and …

A Week In The Life of Bob’s Business

Bob’s Business is incredibly lucky to have four different students working at Bob’s Business over the month of August where they get a chance to gain work experience in the Cyber Security Field. Sally Shenton, who was interested in marketing, was the first student to visit us and this is her experience I have recently been at Bob’s Business on …

Bob’s Business supports Get Safe Online Day 2016

Bob’s Business is happy to once again support our partners Get Safe Online on their annual day to educate the UK public about the dangers of poor cyber security hygiene. Take a read below to find out what the day is all about and how you can too improve your online security. Fraud and Cyber Crime Cost the UK Nearly £11 Billion …

Do You Think Before You Click?

You’ve heard a lot about phishing, but are you aware of the damage it can really cause? Phishing is a method by which criminals and fraudsters try to either pilfer your data, steal your login credentials, or trick you into downloading malware. These kind of attacks rely heavily on the victim committing an action, such as clicking a link or …

Ransomware: From Russia With Love

Over the next few weeks leading up to Infosecurity Europe 2016 we will be posting a series of blogs relating to specific cyber security issues at the forefront of everyone’s minds this year. No matter how hard you try to avoid them, trends are a fact of life. Whether it’s in fashion, music or diets, trends make a mark on …

Malware Mischief

Malware commonly pops up in the news, often with big organisations falling victim. Recently (only this year!) we have had a few high profile cases, from Forbes inadvertently serving malvertising, to trojans being found in more than 100 apps on the Google Play Store, and the continued rise of high-profile ransomware attacks. Viruses, and generally malware, are often talked about outside of cyber …

Yorkshire Cyber Security Cluster Meeting

We are pleased to announce that following the success of the first meeting, we will be hosting the second Yorkshire Cyber Security Cluster meeting in Leeds City Centre on Oct 20th. The meeting will be a great opportunity to share ideas, network and collaborate with others in the information security field. The location of the second meeting is Aspire Leeds in Leeds City Centre. …

Passwords… Have You Changed Yours?

It’s time to change your passwords! If you haven’t changed your passwords recently, now is as good a time as any to update the passwords on your accounts to ensure computer security, account security and password strength for yourself and your organisation this new year. We are running ‘Change Your Passwords Month’ in conjunction with Get Safe Online’s ‘Change Your …

Could you spot a bribe if you saw one?

Bribery is to business as a faulty cornerstone is to a foundation. Whether it takes place on the top level of your organisation’s high rise, or in the basement, everyone is going to feel the effects. This is why we have a built a module around the Anti Bribery Act, which will highlight your employee’s responsibilities towards identifying and mitigating …

Don’t Get Conned Out of Christmas!

The festive season is nearly upon us, and its prime time for online criminals to kick it up a notch in their attempts to con you out of your christmas! So this year, we are supporting Get Safe Online and Action Fraud in their campaign to warn people that online crime is definitely coming to town. Today (Monday 23rd November) …

Information Security Awareness & The Need for a Security Conscious Workforce

At Bob’s Business, we understand that information security isn’t always at the top of your to-do list. Would you reconsider your priorities if you knew that cyber security is the one thing that could bring an entire organisation to a halt in a matter of minutes!? There are three main risk areas within your business; physical intrusion, technical vulnerability and …

Could You Spot a Phish?

At Bob’s Business it’s our primary focus to teach organisations how to protect their data and mitigate phishing attacks. By nature, we all make mistakes, and the majority of us will at some point get caught up in a phishing net; our aim is to keep you up to date on the best practice. It’s no surprise that phishing attacks …

Merthyr Tydfil County Borough Council

Here at Bob’s Business, we are very pleased to announce it’s been five years since Merthyr Tydfil County Borough Council first started their journey to a more secure culture in their organisation along with Bob’s Business, and they recently renewed for the fifth time! We are very glad they are as committed as we are to keeping their organisation’s data …

Secure Gaming

In the world of information security, the gaming scene often slips quietly by, unnoticed. However, with new technologies and high speed internet connections, online gaming is increasing in popularity. Many gamers are now investing large amounts of time and money into online games, and others have seen an opportunity for unethical profit or mischief. Gamers should be aware of the …

Join our Webinar – ‘The Weakest Link’

Would you be able to spot the weakest link within your organisation? This presentation will focus on bringing our weakest links from an information security point of view, our employees, and making them our ‘front line defenders’ against the current dangers we face within the battle of protecting company data and brand equity. We will explain why and how employees need to …

Yorkshire Cyber Security Cluster

During a fantastic year for Bob’s Business, we’re extremely pleased to announce that we are the founders of the first Yorkshire Cyber Security Cluster! The Yorkshire Cyber Security Cluster is an initiative which will help regional businesses within the Information Security field to work collaboratively to build and increase information security knowledge, provide a networking platform to share ideas and …

Learning at Work Week

The majority of organisations treat Information Security Awareness training as a tick-box exercise, expecting users to absorb hour long power points or speaker lead training with overkill of information. For Learning at Work Week, we want to share our approach for a successful campaign comprising of on and offline resources, entertaining materials and content your users will actually relate to …

Client Competition

As a big thank you to all our lovely, loyal clients (and in a bid to push your course completion rates over the edge) we have decided to run quarterly competitions with some great treats up for grabs that all the office can enjoy! Entry is simple – all our clients are automatically entered and the winner will be the …

Our ISO 27001 Certification

Last week we became ISO 27001 certified, WOOHOO! Trust us, we feel your pain! Getting ISO 27001 certified certainly isn’t as simple as ringing the awarding body and asking them to email you a certificate – there’s real work involved! Nine months of hard work, policy writing and implementing new systems finally paid off and we couldn’t be happier.  Today …

Information Security Training As A Prevention… Not A Cure!

Why wait for the worst to happen? – Act now. Recently I’ve been wondering, why does it take a serious threat to network security, customer data and financial information to kick us in to touch with our Information Security responsibilities? Surely, the old adage “Prevention is cheaper than the cure.” still applies? We all remember the Heartbleed bug that compromised …

World Backup Day Tips

How many hours would it take you to remember or replicate every document, image or file you hold on your PC or Mobile Device? —10? 20? Or even more? Still think you can’t find ten minutes to back it all up? We have found that people don’t really appreciate the importance of backing up their data. It’s quite simple – …

Job Fraud

Job fraud is becoming an increasingly common scam, particularly among websites such as Facebook, Linkedin and Gumtree! Fake jobs have even been found on legitimate job sites! Worryingly, over 2500 job scams were reported to Action Fraud in 2014… But fear not! Bob’s Business are here to help raise awareness and keep you safe from these cyber criminals, in conjunction …

Stay Safe and Secure this Christmas

The festive season is a popular time for fraudsters! The increase in online shopping means many of us are left vulnerable to hackers and attackers because we are so preoccupied! Last year, a fifth of us did all our Christmas shopping online, with over half of us doing over half our shopping online! This increase has helped online frauds to …

How to protect your business from cyber threats

Cyber attacks are increasing. It’s hardly breaking news, but it’s something that we need to be aware of, and acting upon, now. Many business owners, especially those with smaller businesses, think that they are immune to the cyber threat, and that the warnings we see in the media on an (almost) daily basis don’t apply to them. They do apply. …

Rules Are Made For Fools Posted on Monday, October 13th, 2014 in

I surprised my son last week. He was in the proverbial doghouse for dropping the family laptop. Now the crazed crystal garden that was growing across the screen with cracks like scale San Andreas models could only mean one thing…something expensive was going to happen. Lessons are important when given a personal edge, and there was a mixture of compassion …

Don’t be a victim of online crime, working together to raise awareness

The way we see online crime has changed irrevocably over the last few years as it moves out of the shadows. These crimes, committed using a computer, hardware device or internet, by their very nature have had a reputation for being faceless and anonymous. Together with a misguided belief that victims were not ‘physically’ harmed, this previously led to a …

My Work Experience at Bob’s Business

Bob’s Business is incredibly lucky to have four different students working at Bob’s Business over the month of August where they get a chance to gain work experience in the Cyber Security Field. Jacob Peace, who was interested in programming, was the second student to visit us and this is his experience For my work experience at Bob’s Business, I …

Top 4 Ways to Protect Yourself from a Ransomware Attack

Last week, it was reported that the National Crime Agency (NCA) has teamed up with the FBI and other cybercrime experts to take down a criminal network’s ‘command and control’, giving the public up to two weeks to protect themselves against malware such as Gameover, Zeus, GOZeus, or P2PZeus, and ransomware such as Cryptolocker. The botnets, dubbed GameoverZeus (GoZ), are …

Gameover Zeus and CryptoLocker warning

The National Crime Agency (NCA) has given the UK public two weeks to up their computer defences. Two forms of malware (GameOverZeus & CryptoLocker) have been attacking hundreds of thousands of users with increasing severity as time has passed. goZeus and CryptoLocker both have different methods,  however they have a singular goal; to take as much money from you as …

The Internet of Things – The Hype

The ‘Internet of Things’ has caused a real stir, and we want to examine the Information Security threats it poses for your organisation. 50 years ago avid followers of star trek wouldn’t have believed that the technology in their beloved SCI-FI movies would become common place in the everyday lives of their grandchildren. Tales of artificial intelligence and household objects …

Senior Management’s Information Security Responsibilities

Expenditure on information security policies, procedures, technologies and people is escalating and yet security breaches are still frequently reported with rising costs. We have to ask, why? Extensive research has thrown out one possible cause of these prevalent security breaches; senior management.  Articles, blogs and tweets can be seen every day with strap lines such as ‘CEO facilitated security breach through lack …

Staying Secure on Valentines Day

Buying your loved one some antivirus software for Valentine’s day may not be the most romantic of ideas, but trust us it would be a very sensible gift idea. Don’t go thinking that scammers won’t stoop to the low of playing on your raw emotion; the valentines hysteria can distort your better judgement and leave you in a costly mess …

SME’s Guide to Information Security

Information Security can seem like a daunting subject especially for an SME with limited resource, but as a connoisseur of all things cyber Bob wants to assure you that by following his simple steps, you will never fall foul when it comes to your organisation’s security. Let’s start with the basics, passwords: Never use a password that is romantic or personal …

The Insider Threat

The Information Parasite. A Parasite lives on its host and derives nutrients such as sensitive data, company critical information, intellectual property and other vital assets at the expense of its target. The average parasite is around an inch in length, possibly even smaller, you wouldn’t even notice if you had one lurking somewhere on your person, would you? The fact …

Shop Securely This Christmas

Ensure the only pounds you’ve lost in January are those from that double helping of Christmas pud! The general consensus at Christmas is that we all gain a little and at Bob’s Business we want to make sure that you don’t lose any pounds during the festivities. Of course, we’d all love to lose weight whilst having our Christmas dinner, …

Don’t be in the dark about Cryptolocker!

Bob can’t believe his ears: Warnings have been issued from the NCA’s Cyber Crime Unit that an insidious attack has been launched, a virus named CryptoLocker is on the loose and targeting users PC’s with an aim of holding data hostage. Once the computer has been taken, these crafty criminals offer you the option to pay a ransom to get your personal data …