Cyber Security Awareness Training with Bob's Business Is...

  • Suite of 24 training modules.
  • Engaging training solution complete with a communications plan and employee engagement resource pack
  • Animated modules based on relatable office-based scenarios
  • Employees will be able to detect and mitigate security risks effectively
  • A managed service ensures minimal client input
  • Compliance made easy with training that covers best practice
  • Advanced and automated reporting features
  • Bite-size training with minimum disruption to job role

Learning and Policy Management Platform

The Learning Platform is your organisations own knowledge centre for managing internal training and company policies in one location, including documents, videos and learning resources.

  • Customisable - Reflect your organisational branding which gives staff reassurance

  • Mobile Compatible - Access the learning platform on-the-go

  • Policy Management - Host, manage and monitor all of your company policies and provide compliance reports
  • Report Security Breaches - All portal users are encouraged to report security breaches at the click of a button

What are the Modules Covered?

BobThis is a threat that thrives on individuals’ emotions and greed and is therefore a potential risk to all employees within any organisation. An advance-fee fraud scam tricks victims into paying money up front on the false hope of receiving a large windfall later.

The approach can be made by letter, fax, email or telephone and invariably these appear to come from high ranking government or bank officials. This module introduces Advance Fee Frauds and explains how they work and what to look out for.

This module covers…

  • An introduction to Advanced Fee Frauds scams
  • How to avoid becoming a victim
  • The potential consequences of being a victim
  • Where to go for help if you become a victim

BobDoes everybody really know a bribe when they see one? Would you think giving money to speed up a business process is a bribe? Bribery is a difficult problem to contain because it is sometimes hard to see the true nature. This module will help your staff differentiate between a bribe and a good natured act.

This module covers…

  • Innocent gestures that can be perceived as bribery
  • Consequences of accepting a bribe
  • Dangers of offering gifts and incentives
  • Responsibilities for preventing bribery

BobThis module is applicable to any and all organisations that use electronic systems. The process of backing up data has been long seen as a vital security measure as backups can be used to repair any information loss ranging from viruses to accidental fire. Backing up data is a vital security measure that ensures an organisation can repair information loss resulting from anything from a fire to a virus attack.

This module explains why backing up information is critical and provides best practice advice on how to back up data to ensure information recovery is possible and business disruption is minimal.

This module covers…

  • The dangers of failing to back up information
  • Best practice regarding the storage of backups
  • The types of information which should be backed up
  • The frequency of backing up information

BobThis module is applicable to your organisation if you need your employees to have an understanding of Business Continuity Planning and the role they play in creating and executing a plan. A Business Continuity Plan is a roadmap for continuing operations under adverse condition including natural or man-made incidents.

Information is a key organisational asset and loss of information can lead to loss of business, productivity, reputation and public trust. This module contains an overview of Business Continuity Planning and guidance on how to plan for the unexpected, preventing the loss of critical information and services.

This module covers…

  • An introduction to Business Continuity
  • The benefits of Business Continuity Planning
  • Why Business Continuity Planning is important
  • Who should be responsible for business continuity planning

 BobThis module is applicable to your organisation if you believe information is a key organisational asset and protecting it is a shared responsibility. Information Classification defines a set of protection levels and special handling measures for information which is valuable, sensitive or critical to your organisation.

Information Classification assigns an owner to each piece of information. This module introduces Information Classification and outlines the responsibilities of an asset owner with regards to classifying, sharing, storing and disposing of information.

This module covers…

  • Why Information Classification is important for overall security
  • How information is classified
  • What protective markings are and how they should be applied
  • Guidance on how to store restricted information securely
  • Individual responsibilities regarding the disposal of information

BobA cornerstone of Information Security is establishing a clear system for the handling of any personal information. Believe it or not, a system for the handling of images relating to individuals is no different. It is important to establish who has responsibility for the control of the images, for example, deciding what is to be recorded, how the images should be used and to whom they may be disclosed.

This module covers…

  • Your responsibilities regarding the release of CCTV footage
  • How to handle Surveillance footage securely
  • How to judge whether or not to disclose the footage

BobIf your organisation handles personal information, you have a number of legal obligations to protect that information under the Data Protection Act 1998. Data Protection Act training is an important part of any organisation’s strategy as it affects customers, employees, stakeholders and partners who all need to know that their information is safe with your organisation.

This module contains an outline of the Data Protection Act 1998. The purpose of the Data Protection Act is to provide regulations for the capture, processing, maintaining and retention of data relating to individuals.

This module covers…

  • Introduction to the Data Protection Act 1998
  • What a Subject Access Request is and how it should be dealt with
  • The 8 principles of Data Protection
  • Who is responsible for the protection of data
  • Why Data Protection is important

BobThis module is applicable to your organisation if you use email as a form of communication. The legal standing of an email is the same as a letter on company stationery so being careful with what is sent and how it is sent is important, both to protect your reputation and avoid legal issues.

This module contains information regarding how using emails incorrectly can cause problems, not just for the organisation but also for its employees, clients and suppliers, and how sending mass emails can be perceived as spam.

This module covers…

  • Best practice when writing emails
  • A definition of SPAM and its consequences
  • Legal disclaimers

BobImagine knowing somebody knew something about you, but they refused to tell you what it was? Do you think it would frustrate you?

It’s sometimes hard to keep track of who knows what about you. But when both the Freedom of Information Act 2000 (FOI) and the Environmental Information Regulations 2005 (EIR) were introduced, it became the law for public sector organisations to satisfy requests for information held by public authorities.

But failure to understand or comply with either of these acts could land you in some very hot water… that’s why this month’s module is Freedom of Information.

This module covers…

  • How to deal with an information request
  • What information can (and cannot) be requested
  • What might happen if you breach these acts

BobA good workplace isn’t complete without health & safety. Every day countless people are injured at work and have to take time out to recover. Many people are unaware of the precautions and procedures that need to be taken in order to protect themselves and their colleagues from harm. Educate your workforce on how to keep the workplace safe with the health & safety module!

This module covers…

  • The importance of risk assessments
  • How injury at work can affect the business
  • Who is responsible for health & safety?
  • What can happen if health & safety isn't controlled

BobIdentity theft is an increasingly common crime affecting both individuals and companies. Criminals are working harder to get information they can use to steal identities for the purposes of theft or making false loan and credit applications.

This module contains information on how to better protect your business identity and personal identity, the dangers of incorrectly disposing of information and the true value of information which helps to identify you to criminal minds.

This module covers…

  • Introduction to Identity Theft
  • Practises that will help prevent Identity Theft
  • Business practises that put companies at risk
  • How to safely dispose of sensitive data

BobIf you want to lower your carbon emissions, you’re going to need to change a few things. Many organisations don’t implement strategy for actually doing so. Enter ISO 14001; a standard for implementing measures to manage an organisation’s resources effectively to help the environment. All it takes is that first step for you and your staff towards working to being that little bit greener.

This module covers…

  • The importance of an Environmental Management System
  • The requirements to lowering your carbon footprint
  • What you can do to lower Co2 emissions in your office

BobInformation Security is just as important to your organisation as it is to you, and that’s why thousands of companies across the country are implementing an Information Security Management System (ISMS). ISO 27001 is a recognised standard for implementing an ISMS, and it’s very important to your staff to follow it.

This module covers…

  • What is ISO/IEC 27001?
  • How does it protect my company?
  • What is meant by Confidentiality, Availability and Integrity?

BobThis module is applicable to your organisation if you want to encourage staff to become more security aware in relation to your organisational information and ultimately prevent information loss, damage or leakage.

Maintaining a clear desk policy reduces the risk of critical business and information disclosures and personal information being stolen or incorrectly thrown away. This module introduces the principles behind keeping desks clear and best practices for storing information.

This module covers…

  • Adopting a clear desk policy
  • Best practice advice on how to store information
  • The consequences of not keeping a clear desk
  • The importance of locking your computer screen

BobThis module is applicable to your organisation if your employees work in multiple locations and use mobile devices such as laptops, mobile phones and data sticks. If your organisation is committed to remote working for business purposes, you must ensure that suitable controls are in place to prevent loss of or interference with critical business information. 

This module contains identifiable scenarios which highlight the danger and risks associated with working in locations that are not protected by your internal network and guidance on how to protect your physical devices and the information they contain.

This module covers…

  • The risks associated with using mobile devices in unprotected environments
  • Methods for safe guarding information when working remotely
  • Guidance on the safe storage of mobile devices
  • Individual responsibilities with regards to the protection and use of mobile equipment

BobThe PCI DSS module is applicable to your organisation if you accept credit/debit card payments or process cardholder information.  It is a legal requirement that your organisation implements a formal security awareness program ensuring all your employees who handle card details are aware of the importance of data security.

The Payment Card Industry Data Security Standard (PCI DSS) contains a set of comprehensive requirements for maintaining payment account data.  There are 12 requirements in total; this module outlines those applicable to members of staff who process card holder data.

This module covers…

  • Introduction to PCI DSS
  • Overview of the 12 requirements of the Standard
  • Which data elements must be protected
  • Processing of information with or without the cardholder present
  • Individual responsibilities with regards to the protection of card holder data

BobThis module encourages security awareness and the protection of your organisations information, with the ultimate aim of reducing information loss, damage or leakage.  Passwords are critical to your organisation as they help to prevent security breaches and restrict access to your systems and vital information.

A good password is one that’s hard to guess, yet easy to remember. This module will ensure all staff gain a greater understanding of the importance of creating and maintaining secure passwords, but also provides guidance on how to create a secure yet memorable password.

This module covers…

  • Why passwords are crucial to maintaining a secure business
  • Guidance on how to construct a secure password
  • Best practice advice on when to change passwords
  • The importance of keeping passwords private

*Please Note*

This module is provided as a FREE Demo, if you register with ISKH and then we can enable your access to the module.

BobThis module is applicable to all users of electronic mail. Phishing is the practise of sending out false emails, generally posing as a bank or similar organisation, to a wide audience with the hope that some of them will reply and divulge their account details.

Phishing attacks can lead to financial loss or loss of business critical information and can affect a company’s reputation. This module introduces Phishing and demonstrates how easy it is to be fooled into divulging information which can then be used to obtain personal or company information.

This module covers…

  • How a Phishing scam works
  • The repercussions of a Phishing attack
  • How to avoid becoming a victim

BobThis module is applicable to your organisation if you believe protecting business critical information is a shared responsibility. The protection of your business premises is crucial as all the confidential information that is owned by your organisation is either stored or can be accessed from your premises.

This module highlights how simple it is for unauthorised individuals to enter business premises and access confidential information. This module also introduces people-based controls and personal measures that can be undertaken to prevent unauthorised access and information being compromised.

This module covers…

  • Methods of keeping your business premises safe
  • Potential threats and ways of countering them
  • What people-based controls are
  • Dealing with unfamiliar faces in a non-public place

BobThis module is applicable to all organisations: small, medium or large. Good Risk Management is crucial to maintaining a successful business. While Risk is commonly regarded as negative, Risk Management is as much about exploiting the potential opportunities that come with Risk as well as negating them.

This module contains an introduction to Risk Management, the key elements of the Risk Management process, the responsibilities of your employees when dealing with risks and the benefits good management can provide.

This module covers…

  • An introduction to Risk Management
  • Outline of the Risk Management Process
  • The four Ts of Risk Management
  • Roles and responsibilities relating to Risk Management
  • The benefits of good Risk Management

BobPrinting and faxing is often overlooked as a security risk as it isn’t immediately obvious as to the possible dangers, however they can result in confidential or classified information being seen or taken by the wrong people and that could be devastating to your organisation’s standing.

This module covers…

  • The dangers of printing classified information
  • Best practice regarding documents
  • Safe usage of the fax machine
  • Ensuring your confidential documents safety

BobRight now, social media is integral to how modern businesses are run. It can be an invaluable tool if used in the right way. However, as helpful as it can be, it can also be just rather damaging if not used right. In Bob’s Social Media Module, you can make sure there are no slip-ups online with your Social Media Use!

This module covers…

  • Know what is acceptable and what isn’t when using Social Media.
  • How to effectively use Social Media to your benefit.
  • How Social Media could cause damage to your business.

BobThis module will benefit any member of staff who comes into contact with the internet or an e-mail system. A virus is a program which enters your network or computer without your consent with the intention of damaging the network or taking confidential information. In many cases a virus will replicate and spread across the network resulting in a loss of resources and time.

This module contains the information your employees need to help them identify potential viruses and prevent them accidentally downloading software which could be damaging to your organisation.

This module covers…

  • Applications which are susceptible to viruses
  • How to handle emails you suspect to have a virus
  • How to identify that your system has a virus
  • Maintaining virus protection

BobThis module is applicable to your organisation if you allow your employees to access information over the internet. The internet is an extremely valuable resource and access to online information is critical for most businesses. Therefore it is important that all your employees are aware of online threats and the danger these pose for your organisation.

This module contains a range of tips that will help your organisation and its employees stay safe online.

This module covers…

  • How to use the internet safely
  • Identifying and avoiding online threats
  • Accessing secure websites
  • Advice when completing online forms

Bob's Business Copyright Statement

IS Know How is a Silver Partner of Bob's Business and as such, has agreement to make use of the various content and materials during the course of ISKH's business. All materials, including content, graphics including 'Bob' themed images, code text and design are controlled by Bob’s Business Ltd. 2011 - All rights reserved, except where otherwise indicated. All requests for use from external parties should be directed to Bob's Business.