Bulletproof’s range of cyber security, data protection and compliance services are your best defence against threats to your business. With nearly a decade of providing trusted security services, we’re continuing our mission of solving the greatest cyber security & compliance challenges through innovation and simplicity. Explore our range of services and find out how Bulletproof can help your business.
Helping people solve their security challenges is what we do, so we’re always keen to hear from you.
Find out more about penetration testing – what it is, when you need it, and why it’s a core component of any business. Discover how pen test helps with compliance, powers best practices, and helps your organisation win new business.
Get peace of mind that your data protection is being managed by trusted, certified consultants. All Bulletproof data protection services are delivered by our highly trained, experienced and qualified staff.
Go beyond compliance with information security services that are designed to give real operational benefits to your business. All delivered by seasoned, certified Bulletproof security consultants.
No matter what your cyber or compliance challenges, Bulletproof is here to help. We like to work with you as a trusted partner to solve problems, not sell services. No pressure tactics and no false promises.
At Bulletproof we love to solve problems with simplicity & innovation. It’s our mission to make compliance & cyber security services accessible to all. We take pride in building and nurturing teams of exceptional talent, so we’re confident that our cyber security & compliance services are the best way to stay one step ahead of the hackers and protect your business.
Helping people solve their security challenges is what we do, so we’re always keen to hear from you, no matter what you have to say.
Keiran Mather
Bulletproof red team demonstrate a novel approach to evade static analysis in Linux malware.
Read More
Many organisations are acting to prevent the spread of Coronavirus by allowing their employees to work from home. In order to be able to do so comfortably, and without introducing a component of risk, businesses should follow certain best practices that can guarantee their digital assets are just as secure with a remote workforce as they would be in-house.
Unfortunately, cybercriminals have already started to take advantage of this pandemic. From the Coronavirus heat map that included malware, to the phishing emails aimed at scaring recipients, threat actors are opportunistic and will try to capitalise on peoples’ vulnerability in this difficult moment.
Bulletproof’s experts have compiled a list of practical security steps to assist business owners, managers and IT teams in devising their strategy for protecting their organisations while employees work remotely. Alternatively, check our long form webinar where our CEO answers your most asked questions about securing your home working environment:
Phishing training is already in place at most organisations, and rightly so, since malicious emails remain one of the most popular entry vectors. Given the number of coronavirus-themed emails that have been circulating, it would be worth putting in place a short refresher of email hygiene best practices to warn employees of possible scams.
The rules remain the same:
When working from home, you should connect to the business’ VPN or to its trusted, secure applications when working with sensitive data.
If you are working from a personal device, it’s always best to work via the Cloud as much as possible. Personal devices are by definition more vulnerable, therefore, it is worth being extra careful to avoid the machine getting compromised and files being stolen.
If you are an administrator of systems and are granted privileged credentials, use two-factor authentication. Any employee with access to sensitive data should also have stronger authentication measures in place. It may take a little longer to access certain systems, but it is ultimately one of the best ways to ensure that only the right people have access to certain data.
According to the principle of least privilege, employees should only be granted permissions appropriate for their role, and access to mission critical systems should be restricted.
If you have not been issued a device from your organisation and need to use a computer that you share with other users, the most secure option is to access Cloud application services (Office 365, G Suite, etc) through your web browser, rather than the app.
Monitor your servers for suspicious remote worker activity on all services and if possible, use conditional logging (restrict access to regions your remote workers are in, and scrutinise impossible travel).
If you are planning to issue devices to employees to allow them to work remotely, you should harden them by installing monitoring tools and checking endpoints. Cloud services should also be hardened, and Office 365 users should follow the security centre advice around best practices.
Internet facing systems should continue to be scanned for potential new vulnerabilities and patch releases. If you have a limited capability to apply patches, hold calls to discuss how to best prioritise them.
If these practices are followed, organisations can make the shift to remote working to protect employees and to slow down the spread of this virus without compromising their security posture.
Temporarily (and swiftly) changing the way we work may seem like a dauting task, but it is possible, and will ultimately help protect employees and the most vulnerable in our society who can’t afford to take risks.
Mobile working and remote system access means some businesses can continue to operate, however this exposes new risks that need to be managed to avoid a serious security breach.
We can help your organisation identify these risks and work with you to put the right security measures in place. We provide an unrivalled range of security and compliance services including penetration testing, vulnerability assessments and 24/7 proactive SIEM threat monitoring – all tailored to suite any size organisation.
Contact us today to gain peace of mind and find out how you can avoid cyber security issues for your organisation and employees. Email: info@bulletproof.co.uk.
Information security wizard, evangelist, and guru – not to mention co-founder of Bulletproof. Oli’s always sharing deeply interesting and insightful things on this blog and on his LinkedIn. With many years’ of experience in understanding information security and innovation, Oli’s blogs are always a highlight.
Worried about remote workers on public Wi-Fi? Let Bulletproof conduct a vulnerability scan across all your devices.
If you are interested in our services, get a free, no obligation quote today by filling out the form below.
I'd like to receive Bulletproof communications about relevant services and events
For more information about how we collect, process and retain your personal data, please see our privacy policy.