Bulletproof’s range of cyber security, data protection and compliance services are your best defence against threats to your business. With nearly a decade of providing trusted security services, we’re continuing our mission of solving the greatest cyber security & compliance challenges through innovation and simplicity. Explore our range of services and find out how Bulletproof can help your business.
Helping people solve their security challenges is what we do, so we’re always keen to hear from you.
Discover CREST penetration testing & continuous security
Internal & external infrastructure, network & system testing
Manage multiple tests & get external security assurance
Thoroughly assess your web apps & APIs for security flaws
Test your response to a simulated real-world cyber attack
All cloud platforms & services tested, including Azure & AWS
Test your human cyber defences with social engineering
Android, iOS & custom mobile application security testing
Find out more about penetration testing – what it is, when you need it, and why it’s a core component of any business. Discover how pen test helps with compliance, powers best practices, and helps your organisation win new business.
Gap analysis, implementation, audits & more from GDPR experts
On-going support to easily manage your data protection obligations
Consultant-led support to meet all levels of DSPT submission
Flexible & engaging data protection training from certified experts
Get peace of mind that your data protection is being managed by trusted, certified consultants. All Bulletproof data protection services are delivered by our highly trained, experienced and qualified staff.
Gap analysis, implementation, audits & more from dedicated ISO consultants
Find the next step in your strategy with this consultant-led assessment
Get quick & easy CE certification with a range of feature-packed packages
Flexible access to top-tier information security strategy & management
Experienced SOC 2 consultants, AICA audits & compliance automation platform
On-site, remote and video-based security training to boost your resilience
Affordable expertise & support to help you meet & maintain PCI DSS compliance
Go beyond compliance with information security services that are designed to give real operational benefits to your business. All delivered by seasoned, certified Bulletproof security consultants.
24/7 defence against cyber attacks with proactive threat detection
Get help responding & recovering from cyber incidents
Detect, analyse and stop cyber attacks with real-time prevention
Forensic support & data recovery following cyber attacks
Stay on top of new vulnerabilities with powerful, flexible scanning
Evaluate your wireless network for security weaknesses
Discover how your business can identify & manage cyber threats
Comply with regulations, meet certification standards & best practices
Train and test your staff for security resilience, data protection & compliance
No matter what your cyber or compliance challenges, Bulletproof is here to help. We like to work with you as a trusted partner to solve problems, not sell services. No pressure tactics and no false promises.
Learn about our mission to make cyber & compliance accessible to all
Grow your business with high-margin, high-value & partner-ready services
Become part of the Bulletproof team & supercharge your career
Bulletproof’s in-house SOC powers our Managed SIEM & MDR services
We love to talk. Tell us about your cyber & compliance challenges
At Bulletproof we love to solve problems with simplicity & innovation. It’s our mission to make compliance & cyber security services accessible to all. We take pride in building and nurturing teams of exceptional talent, so we’re confident that our cyber security & compliance services are the best way to stay one step ahead of the hackers and protect your business.
Helping people solve their security challenges is what we do, so we’re always keen to hear from you, no matter what you have to say.
Get the latest news, views & expert insight in the world of cyber security, data protection & compliance
A helpful index of cyber security terms, compliance acronyms and industry terminology to make life easy
Discover what we have to say about the threat landscape & what businesses need to know to get ahead
Find out how we can make companies like yours Bulletproof. Don’t take our word for it, hear direct from our clients
Detailed insights & helpful tips for understanding penetration testing, data protection & more
Interesting data & top tips at a glance, with insightful infographics covering all areas of cyber security & compliance
Watch our experts talk through their thoughts & opinions on a variety of security & compliance topics
See when & where we’re going to be bringing Bulletproof insight to an event near you
Ayisha Bari
Find out what ransomware is, how attacks work & types of attack to help you get started with keeping ransomware out of your business.
Read More
Following on from Brexit, the UK received a positive adequacy decision on its personal data security standards by the EU. Building on this, the UK’s Information Commissioner's Office (ICO) has opened a consultation period to introduce its new International Data Transfer Agreement (IDTA). The European Commission has also issued a draft update addressing the same thing. So what triggered this new work? It’s all in response to the work done by privacy activist Max Schrems.
For those unfamiliar with Schrems case, back in 2015 he challenged Facebook, claiming that the Standard Contractual Clauses used by the company were not adequate to safeguard the transfer of personal data to its US servers. The case was presented to the European Court of Justice (ECJ) where, after much scrutinising, it was found that the SCC were valid. However, as data protection laws vary from state to state in the US, the ECJ said that consideration should be given to the legal system where the data was being transferred to. Such as, does it have data protection laws equivalent to those in the EU.
Max Schrems had good form for challenging big companies’ data protection rules, as in 2013 he challenged the validity of the Safe Harbour Agreement between the EU and the US, when Facebook transferred his (and other EU citizens) personal data to its US servers. The Safe Harbour Agreement allowed data flow between the US Department of Commerce and the EU. This agreement was believed to have had ‘adequate protection’ to allow transatlantic transfer of personal data. However, in 2015 the ECJ found this to be untrue and ruled that the agreement did not provide adequate protection for the EU citizens. This is now famously referred to as Schrems I.
Bulletproof has helpful free resources for organisations looking to find out more about the GDPR. Why not download our educational white paper, watch our insightful webinar featuring our Head of Compliance, or view our interesting infographics.
Back to 2021, and the IDTA is in essence a contract between the exporter and importer. It’s formatted in an easy-to-understand way and includes:
This last point is important to note, as any agreements in place will be overridden by the IDTA if there are inconsistencies between the agreements and the IDTA. The exception to this overriding is if the prior agreements provide greater security than the IDTA, or if the agreements are expressly required by Article 28 UK GDPR.
The draft IDTA so far looks to be a great tool to help organisations in the UK better understand key security measures when considering data transfers. If your organisation transfers data outside the UK to an EEA, or other areas of the world, you should start reviewing the agreements you have in place already to ensure you’re prepared for when the IDTA comes into force. It’s also a good idea to take part in the ICO consultation if you are a data protection practitioner, or if you have legal responsibilities that include giving advice on international data transfers.
Pine Health nursing home closed in 2017 after the CQC published a negative report on its performance. Specifically, Pine Health left behind boxes filled with paper records containing patient medical history and other personal details, which was subsequently compromised. The security company managing the empty building claimed there was 24/7 surveillance and guard dog presence, but journalists were able to gain access to the building to report on this data breach. Both the ICO and the local council investigated the data breach and the locals were shocked to find out people they have known who lived in the care home still had their personal data laying around.
Lessons Learned
In the current digital environment, many businesses have moved on from the cumbersome management of paper records in their day-to-day operations. However, paper records exist in many places, and we might just forget about our legacy records in storage boxes. Data breaches like the Pine Health demonstrates to us all that we need to ensure we identify all formats in which we hold personal data, this can be from Teams meeting recordings, voicemails, or old filing cabinets. The International Data Transfer Agreement is another step to a future of organised, compliant and secure use of personal data, but businesses have to be ready for it.
Ali is a seasoned GDPR Consultant who's written insightful articles on the subjects of GDPR compliance and data protection.
Bulletproof’s experienced data protection officers give your business on-going support and maintenance of your data protection obligations. Find out more about our flexible, cost-effective packages
If you are interested in our services, get a free, no obligation quote today by filling out the form below.
I'd like to receive Bulletproof communications about relevant services and events
For more information about how we collect, process and retain your personal data, please see our privacy policy.