B&B - News and FAQ

Client Portal

FAQ's

Repeated penetration tests can be costly, and the knowledge required to filter through and understand the data results from automated scanners is not always available in-house. Ideally, penetration testers and automated scanners work together to discover and exploit issues, with all issues being followed up by an experienced tester to verify possible impact and business risk. Bruce & Butler’s Ongoing Testing service combines continuous vulnerability scanning with regular penetration testing activity to enable your internet-facing attack surface to be continually tested for vulnerabilities. This allows you to move fast, but stay secure.

The main aim of penetration testing is to identify technical vulnerabilities in IT and communications systems that could leave your organisation open to attack should they be exploited by a potential threat actor – from a disgruntled employee or casual hacker to a state sponsored cybercriminal. Once identified, these weak points within a network infrastructure, application or even business logic can be remediated to strengthen your overall security posture. Regular penetration testing should form a core part of your security strategy.

A Penetration Test, also known as a pen test or ethical hacking, describes the authorised assessment of computer networks, systems and applications performed to evaluate and identify potential threats and address security weaknesses.

You must appoint a DPO on a mandatory basis if you meet any of the following 3 conditions: (1) Where the processing is carried out by a public authority or body; (2) Where the “core activities” of the Data Controller or Data Processor consist of processing operations which require regular and systematic monitoring” of data subjects on a “large scale”; or (3) Where the “core activities” of the Data Controller or Data Processor consist of processing on a “large scale” of “special categories of personal data” or data relating to criminal convictions and offences. You can appoint a Data Protection Officer on a voluntary basis to give your organisation and its stakeholders added assurance and to also further demonstrate and meet accountability requirements under the UK GDPR. A Data Protection Officer can be a member of staff or an appointed 3rd party retained on a service contract.

Whilst not always a full-time role, DPOs are required to be independent and have specialist data protection expertise. If the role of the IT Manager conflicts with the DPO’s role (which it often does), or they do not have the correct level of Data Protection knowledge and expertise then the IT Manager would not be deemed appropriate for the role of DPO.

You will benefit from external and independent advice free from any conflict of interest. This will be given by dedicated industry professionals who have specialist knowledge and professional experience. You will be allocated a main point of contact who takes day to day responsibility for this role and is supported by other specialists within our team. Furthermore, External DPOs can make use of their best practice experience from other companies for your organisation’s benefit, creating a synergy effect all whilst being more cost effective than recruiting in house.

Having a framework or standard to work against allows a concise and clear methodology of handling a process, for example Quality control or Information security. They provide employees and stakeholders with the understanding and reassurance that the process is being handled in an appropriate and guided way.

Depending on the size of your organisation this process can take, on average, between 3 and 6 months.

With networks and business environments getting larger and more complex spotting abnormalities can be a difficult task. SIEM software, and the analysts that use it, can filter through copious amounts of logs, traffic, and raw information to discover malicious activity before it causes damage. In short, it can save you time, money, and prevent financial and reputation damage.

Latest News

Cyber Essentials – January 2022 Changes

December 1 2021

On January 24th 2022, The National Cyber Security Centre (NCSC) in partnership with IASME will be releasing the latest version of the internationally recognised Cyber Essentials Scheme.

How Effective Can Cyber Essentials Be For Your Organisation?

November 4 2021

How Effective Can Cyber Essentials Be For Your Organisation? Cyber Essentials is an affordable UK Government backed certification scheme administered […]

How To Become More Cyber Secure On A Budget

September 22 2021

The past 18 months have been a massive struggle for all organisations not only in terms of dealing with COVID-19 restrictions and adapting to remote working, but also with the dramatic increase in cyber-attacks.

Protecting small businesses from cyber-attacks

September 20 2021

Cyber-attacks on small businesses are increasing every year. There are several things you can do to protect your business from the worst case scenario.

Is 2FA effective & do I need it for Cyber Essentials?

September 3 2021

Two Factor Authentication (2FA) works by adding an extra layer login credential beyond the typical username and password.

ISO 27001’s Importance and Benefits

September 2 2021

Demonstrating that your organisation takes information protection seriously.

What is Cyber Essentials?

August 24 2021

Cyber Essentials certification prevents a wide variety of the most common cyber-attacks.

Why invest in a Security Operations Centre (SOC)?

August 13 2021

Here are several reasons why now is the perfect time to invest in a SOC.

Matt Bruce featured in Insider Magazine

January 22 2021

This week, CEO of Bruce & Butler – Matt Bruce – has featured in Business Insider (Yorkshire) “Ask the Expert” column.

Engaging a Data Processor

February 3 2021

A Data Processor is the natural or legal person, public authority, agency, or other body which processes personal data on behalf of the Data Controller.

Contact Us
Today

Drop Us a line

Contact Us

  • This field is for validation purposes and should be left unchanged.