Bulletproof’s range of cyber security, data protection and compliance services are your best defence against threats to your business. With nearly a decade of providing trusted security services, we’re continuing our mission of solving the greatest cyber security & compliance challenges through innovation and simplicity. Explore our range of services and find out how Bulletproof can help your business.
Helping people solve their security challenges is what we do, so we’re always keen to hear from you.
Discover CREST penetration testing & continuous security
Internal & external infrastructure, network & system testing
Manage multiple tests & get external security assurance
Thoroughly assess your web apps & APIs for security flaws
Test your response to a simulated real-world cyber attack
All cloud platforms & services tested, including Azure & AWS
Test your human cyber defences with social engineering
Android, iOS & custom mobile application security testing
Find out more about penetration testing – what it is, when you need it, and why it’s a core component of any business. Discover how pen test helps with compliance, powers best practices, and helps your organisation win new business.
Gap analysis, implementation, audits & more from GDPR experts
On-going support to easily manage your data protection obligations
Consultant-led support to meet all levels of DSPT submission
Flexible & engaging data protection training from certified experts
Get peace of mind that your data protection is being managed by trusted, certified consultants. All Bulletproof data protection services are delivered by our highly trained, experienced and qualified staff.
Gap analysis, implementation, audits & more from dedicated ISO consultants
Find the next step in your strategy with this consultant-led assessment
Get quick & easy CE certification with a range of feature-packed packages
Flexible access to top-tier information security strategy & management
Experienced SOC 2 consultants, AICA audits & compliance automation platform
On-site, remote and video-based security training to boost your resilience
Affordable expertise & support to help you meet & maintain PCI DSS compliance
Go beyond compliance with information security services that are designed to give real operational benefits to your business. All delivered by seasoned, certified Bulletproof security consultants.
24/7 defence against cyber attacks with proactive threat detection
Get help responding & recovering from cyber incidents
Detect, analyse and stop cyber attacks with real-time prevention
Forensic support & data recovery following cyber attacks
Stay on top of new vulnerabilities with powerful, flexible scanning
Evaluate your wireless network for security weaknesses
Discover how your business can identify & manage cyber threats
Comply with regulations, meet certification standards & best practices
Train and test your staff for security resilience, data protection & compliance
No matter what your cyber or compliance challenges, Bulletproof is here to help. We like to work with you as a trusted partner to solve problems, not sell services. No pressure tactics and no false promises.
Learn about our mission to make cyber & compliance accessible to all
Grow your business with high-margin, high-value & partner-ready services
Become part of the Bulletproof team & supercharge your career
Bulletproof’s in-house SOC powers our Managed SIEM & MDR services
We love to talk. Tell us about your cyber & compliance challenges
At Bulletproof we love to solve problems with simplicity & innovation. It’s our mission to make compliance & cyber security services accessible to all. We take pride in building and nurturing teams of exceptional talent, so we’re confident that our cyber security & compliance services are the best way to stay one step ahead of the hackers and protect your business.
Helping people solve their security challenges is what we do, so we’re always keen to hear from you, no matter what you have to say.
Get the latest news, views & expert insight in the world of cyber security, data protection & compliance
A helpful index of cyber security terms, compliance acronyms and industry terminology to make life easy
Discover what we have to say about the threat landscape & what businesses need to know to get ahead
Find out how we can make companies like yours Bulletproof. Don’t take our word for it, hear direct from our clients
Detailed insights & helpful tips for understanding penetration testing, data protection & more
Interesting data & top tips at a glance, with insightful infographics covering all areas of cyber security & compliance
Watch our experts talk through their thoughts & opinions on a variety of security & compliance topics
See when & where we’re going to be bringing Bulletproof insight to an event near you
Ayisha Bari
Find out what ransomware is, how attacks work & types of attack to help you get started with keeping ransomware out of your business.
Read More
The objective of a 'good penetration test' is to help a company improve their security which, ultimately, comes down to planning. Bulletproof’s penetration testers want each and every client to get the most out of their test. With this in mind, they have offered up some helpful tips worth thinking about when booking a security review.
This doesn’t mean you get to eat your penetration tester, though they’re often so dedicated they’ll probably allow this. What they mean is, a penetration test can be a varied thing. When one walks into a sandwich shop and requests a sandwich, they instigate a chain of questions ‘what would you like in said sandwich? Would you like butter? Any salad? Any sauce?’ and so on. Just ask anyone who’s been to Subway. When scoping a penetration test, work out what you want to achieve. Do you want an element of social engineering? A red team test? Is it an infrastructure or application pen test? Authenticated or unauthenticated? What needs to be in scope? Etc.
Know what assets you have in play. Getting this bit wrong can cause a lot of issues later on in a test. If our tester finds a critical issue on a specific server and phones you up to resolve it, only to find that you don’t know what they’re talking about and have no idea where this server sits or what’s running on it, then this is going to eat up a lot of testing time. Similarly, if you don’t know how many desktops or laptops you have or who they are assigned to, this can cause complications.
I shall write this as it was once given to me in an email: “NOTHING IS OUT OF SCOPE FOR AN ATTACKER!!!” Yes, that’s three exclamation marks. It’s fairly common for people to want to test only a certain aspect of their infrastructure. This is typically because a business has limited resources and wants to focus on what they view as 'the important parts'. Also, it might not make sense to test literally everything.
This is something of a double-edged sword. Whilst testing absolutely everything could be wasteful, not testing enough could be a fatal (for your business) error. Setting a scope that’s too limited means that your security isn’t really tested at all. Whilst the handful of servers or machines tested may be deemed secure, that Exchange server you deemed out of scope (or forgot about) may be riddled with vulnerabilities that could bring everything down.
This can be particularly important if you have a number of remote workers. It’s harder (though not impossible) to enforce tight controls on assets not in the office, particularly if you operate a BYOD policy. So, if that VPN and the related firewalls aren’t included in your scope, then there will be problems.
If you’ve got a server in your organisation that was configured by the apprentice just clicking next over and over before heading to lunch, or have been rather lax on pushing out updates, sort these out first. Whilst cyber security firms might be happy to take your money on these occasions, there is very little to gain from booking a penetration test when you already know there'll be lots of issues that are easy to solve. This will simply suck up the time allocated for the test, which could be better spent seeking out those harder to discover vulnerabilities.
This is more important for those with a large or complex infrastructure. If that’s you, it’s worth allocating the time and resources for a ‘proper pen test’. Hackers have no time limits. They can take as long as they like targeting your network and changing their approach. It would therefore be counterproductive to restrict a penetration test to a handful of days. It would force a tester to rush through a large number of attacks or do a thorough job on just a few. Either way, it really limits just how useful the end result will be.
Whilst booking a longer test will be more expensive, you’ll certainly get more out of it. The longer a penetration tester has to assess a network, the more thorough they can be, and the more flaws they can find. The more flaws they find, the more secure your systems will be. Whilst we know one never ending pen test is not at all feasible, the longer one lasts, the better.
Our pen testers are good at what they do, and more importantly, they like doing it. They’re passionate about security, which is why they get so riled up when I ask them about common flaws and weaknesses. They want our customers to get the most from their services, so they make sure they get everything right from the very beginning. Thorough planning and scoping will mean you’ll certainly get a ‘good penetration test’.
So, when you need a security review, follow our testers’ tips and see if you can avoid the common pitfalls. If you do, then they’ll sleep happy at night, dreaming cyber-security dreams.
Joseph is a Communications Executive and Security Blogger who has contributed articles covering a range of topics including staying ahead of cyber threats.
Find out how to secure your business in 10 steps with our free best practice infographic.
Learn how a Bulletproof pen test helped Traced create a chain of trust, improve its security posture, and inspire customer confidence.
If you are interested in our services, get a free, no obligation quote today by filling out the form below.
I'd like to receive Bulletproof communications about relevant services and events
For more information about how we collect, process and retain your personal data, please see our privacy policy.