Bulletproof’s range of cyber security, data protection and compliance services are your best defence against threats to your business. With nearly a decade of providing trusted security services, we’re continuing our mission of solving the greatest cyber security & compliance challenges through innovation and simplicity. Explore our range of services and find out how Bulletproof can help your business.
Helping people solve their security challenges is what we do, so we’re always keen to hear from you.
Discover CREST penetration testing & continuous security
Internal & external infrastructure, network & system testing
Manage multiple tests & get external security assurance
Thoroughly assess your web apps & APIs for security flaws
Test your response to a simulated real-world cyber attack
All cloud platforms & services tested, including Azure & AWS
Test your human cyber defences with social engineering
Android, iOS & custom mobile application security testing
Find out more about penetration testing – what it is, when you need it, and why it’s a core component of any business. Discover how pen test helps with compliance, powers best practices, and helps your organisation win new business.
Gap analysis, implementation, audits & more from GDPR experts
On-going support to easily manage your data protection obligations
Consultant-led support to meet all levels of DSPT submission
Flexible & engaging data protection training from certified experts
Get peace of mind that your data protection is being managed by trusted, certified consultants. All Bulletproof data protection services are delivered by our highly trained, experienced and qualified staff.
Gap analysis, implementation, audits & more from dedicated ISO consultants
Find the next step in your strategy with this consultant-led assessment
Get quick & easy CE certification with a range of feature-packed packages
Flexible access to top-tier information security strategy & management
Experienced SOC 2 consultants, AICA audits & compliance automation platform
On-site, remote and video-based security training to boost your resilience
Affordable expertise & support to help you meet & maintain PCI DSS compliance
Go beyond compliance with information security services that are designed to give real operational benefits to your business. All delivered by seasoned, certified Bulletproof security consultants.
24/7 defence against cyber attacks with proactive threat detection
Get help responding & recovering from cyber incidents
Detect, analyse and stop cyber attacks with real-time prevention
Forensic support & data recovery following cyber attacks
Stay on top of new vulnerabilities with powerful, flexible scanning
Evaluate your wireless network for security weaknesses
Discover how your business can identify & manage cyber threats
Comply with regulations, meet certification standards & best practices
Train and test your staff for security resilience, data protection & compliance
No matter what your cyber or compliance challenges, Bulletproof is here to help. We like to work with you as a trusted partner to solve problems, not sell services. No pressure tactics and no false promises.
Learn about our mission to make cyber & compliance accessible to all
Grow your business with high-margin, high-value & partner-ready services
Become part of the Bulletproof team & supercharge your career
Bulletproof’s in-house SOC powers our Managed SIEM & MDR services
We love to talk. Tell us about your cyber & compliance challenges
At Bulletproof we love to solve problems with simplicity & innovation. It’s our mission to make compliance & cyber security services accessible to all. We take pride in building and nurturing teams of exceptional talent, so we’re confident that our cyber security & compliance services are the best way to stay one step ahead of the hackers and protect your business.
Helping people solve their security challenges is what we do, so we’re always keen to hear from you, no matter what you have to say.
Get the latest news, views & expert insight in the world of cyber security, data protection & compliance
A helpful index of cyber security terms, compliance acronyms and industry terminology to make life easy
Discover what we have to say about the threat landscape & what businesses need to know to get ahead
Find out how we can make companies like yours Bulletproof. Don’t take our word for it, hear direct from our clients
Detailed insights & helpful tips for understanding penetration testing, data protection & more
Interesting data & top tips at a glance, with insightful infographics covering all areas of cyber security & compliance
Watch our experts talk through their thoughts & opinions on a variety of security & compliance topics
See when & where we’re going to be bringing Bulletproof insight to an event near you
Ayisha Bari
Find out what ransomware is, how attacks work & types of attack to help you get started with keeping ransomware out of your business.
Read More
‘Privacy by design’, or as it’s now known, ‘data protection by design and default’, refers to Article 25 of the UK GDPR. This principle makes it a legal obligation for controllers to implement organisational controls which ensure data protection issues are addressed at the design stage of any project. But what does the regulation mean when it refers to organisational controls? For project managers, marketing teams or product developers, the definition of organisational controls would vary, from anti-virus, to a retention schedule, to pen testing, or more. All of these procedures are compliant with the regulations but they address only part of the process, which is why we should refer to Article 35 – Data Protection Impact Assessment (DPIA) to understand what the most appropriate organisational controls are.
A DPIA is the framework by which you can make sure whatever your business is doing is compliant with the ‘by design and default’ section of the UK GDPR. A DPIA makes you look at each and every element of the project, process or system and analyse the data protection impacts. DPIAs are usually split into two sections.
The first half of the assessment explores some of the key principles of the regulation, where you will outline the process from start to finish, identify under which legal basis you are going to process the personal data you collect, the purpose for collecting, how you will gather consent and how long you will retain the information collected. To complete this section successfully we would recommend you first complete data flow mapping exercise, as it will help you visualise the process and identify key points in the process.
The second half of the assessment will require you to identify the risks associated with the processing. It can help to consult with your DPO and colleagues from other departments to cover all risks.
Once a DPIA is completed it will need to be reviewed by your DPO and the business must make a decision on the risks it has identified. Once the all the identified risks have been assessed and addressed, the DPIA must be signed off by the Senior Information Risk Owner (SIRO), or whoever is responsible for compliance within your organisation. Processing cannot start without sign off from SIRO and risks identified at the design stage will need to be reviewed on regular basis, as they may change over time through the lifecycle of the project.
Bulletproof has helpful free resources for organisations looking to find out more about the UK GDPR. Why not download our educational white paper, watch our insightful webinar featuring our Head of Compliance, or view our interesting infographics.
The ICO recommends completing a DPIA when there is a big technological change within the organisation or where you will be carrying out systematic and extensive profiling of data subjects, and most certainly where you will be processing special-category data. But DPIA can also be used to review processes you have in place already as a risk assessment tool. It’s also useful as a documented procedure to ensure the purpose for which you initially collected data is still the same. It is important to include DPIA in the project initiation document as this will ensure staff are aware and complete a DPIA at the earliest possible stage. This means that before any new project, process or system is implemented, you need to do a DPIA.
Project sponsors or managers are responsible for carrying out a DPIA and they usually do this in consultation with other team members involved in the project. The risk section of the assessment would also require input from the IT team to cover information security. Your DPO will be responsible for reviewing the overall assessment to ensure data privacy issues have been addressed appropriately and as they are independent from the project they can highlight areas which may have been overlooked or risks that have not been identified. The SIRO will be responsible for reviewing the risks and along with the DPO will sign off the DPIA before processing can start.
In April 2021 Dallas Police Department undertook a data migration project which resulted in permanent deletion of evidence relating to individual case files containing images, video, audio and notes. The incident happened because IT department failed to follow the proper procedures for data migration. In a scenario like this, carrying out a DPIA would’ve given Dallas Police the opportunity to review the procedures they had in place to ensure they were adequate and easy to understand. It would also have helped them identify what risks were most likely to occur and what were the most appropriate mitigating actions.
Lessons Learned
Ali is a seasoned GDPR Consultant who's written insightful articles on the subjects of GDPR compliance and data protection.
Bulletproof’s experienced data protection officers give your business on-going support and maintenance of your data protection obligations. Find out more about our flexible, cost-effective packages.
If you are interested in our services, get a free, no obligation quote today by filling out the form below.
I'd like to receive Bulletproof communications about relevant services and events
For more information about how we collect, process and retain your personal data, please see our privacy policy.