It will come as little surprise to anyone who’s ever received a suspect looking invoice, but the major technology firms – including Apple, Google and Microsoft – are failing to protect users from phishing email threats. The confirmatory news-flash comes from Plymouths Centre for Security, Communications and Network (CSCAN), who set about finding what action […]
Category Archives: Uncategorized
Introducing the Yorkshire Cyber Security Cluster
We love what we do here at Bob’s Business, and as one of the founders and creators of the Yorkshire Cyber Security Cluster (YCSC) along with CRK consulting, we are proud to be helping regional organisations to become more cyber secure. Introducing the YCSC The YCSC is an initiative created as part of the UK Cyber Security […]
Record GDPR Fine for Google
Whilst the demand for cyber security expertise has never been so high amongst organisations, there is a significant skills shortage within the industry.
Double Award Nomination for Bob’s Business
bob’s Business has been providing engaging, educational cyber security training for its clients since 2007. We pride ourselves on the work we’ve done to help benefit the information security community
ISO 27001: Everything You Need to Know
What is ISO 27001? ISO 27001 is part of the ISO 27000 family, a group of international standards for Information Security Management Systems. It is the best-known standard in the family providing requirements for an information security management system (ISMS). The standard has 10 short clauses and 114 controls that are designed to cover so […]
Shoulder Surfing: What do you Need to Know?
When you think of hacking, you may think of a stereotypical cyber-criminal sat in their basement remotely attacking organisations and servers in order to gain unauthorised access to systems. However, this isn’t always the case as most people seem to overlook one very basic security concern, shoulder surfing! Shoulder surfing is technically another form of […]
3 Cyber Security Horror Stories
It’s that time of year again, some people at home are carving pumpkins and others will be sitting down to binge their favourite horror films. Some of our personal film favourites include Friday the 13th, Nightmare on Elm Street and Shaun of the Dead, but one thing that makes us want to hide under the […]
Why Losing a Laptop Can be a Major Security Risk
Imagine this scenario: It’s been a long day. The client visit went well, they seem happy with what you’ve presented. Later when on the train home, your attention gets drawn away from the client data on your laptop, so that you can play your favourite mobile game to pass time on your commute. You hop […]
How to Combat Cyber Attacks
Every year on the 5th of February, we help celebrate Safer Internet Day; a day to inspire a national conversation about using technology responsibly, respectfully, critically and creatively. As the use of computers and other internet-enabled devices skyrocket, people are becoming more and more susceptible to cyber attacks than ever before. Criminals are figuring out new and […]
What Happened in the Facebook Security Breach?
On Friday it was announced that Facebook was hit by a cyber breach that attacked up to 50 million user accounts. The company indicated that criminals exploited a vulnerable feature due to a software bug which enabled the hackers to act like users on their profile; also referred to as the ‘View As’ option, a […]