Cyber Security Solutions
 Our expertise extends across the full range of cyber security services including consulting, penetration testing and AI endpoint security.
Protect your data with our world-class cybersecurity products and solutions.
Our expertise extends across the full range of cyber security services including consulting, penetration testing and AI endpoint security. We deliver best practice solutions through our partnership with leading cyber security vendors.
AI Endpoint Security
Artificial Intelligence is the newest generation cyber security technology solution. By integrating Artificial Intelligence Endpoint Security into your security framework, you can future proof your business against the latest cyber threats.
Penetration Testing
Regular penetration testing is considered best practice for most medium to large organisations. Our thorough penetration testing process will scrutinize the external facing components of your system, and identify vulnerabilities in your infrastructure.
User Awareness Training
Even with the best cyber security systems in place often the biggest risk can still be people working within an organisation. BT Cyber can provide customised user awareness training to ensure best practice when it comes to end user risk mitigation.
Managed Security Services
BT is one of the few local service providers offering 24/7 uninterrupted firewall monitoring, infrastructure and systems protection. We can work remotely or on-site to provide full outsourcing of your security services requirements.

Cyber Security Blog

01 Aug: Zero Trust Guide: Home Network Security

The recent increase in the number of employees working from home as a result of the COVID-19 outbreak has presented organizations with an unanticipated business issue: the enterprise network has now effectively become much larger, more dispersed, and more difficult to secure with the increase in remote work.

15 Jul: Netwalker Fileless Ransomware

NetWalker has become one of the most popular ransomware families in 2020, targeting companies of all sizes and more recently favoring educational and healthcare institutions. The ransomware is using the current COVID-19 crisis to deploy phishing campaigns that prey on individuals interested in learning more about the virus, including healthcare facility staff.

01 Jul: Application Whitelisting

Application Whitelisting works by specifying which applications can execute (The Whitelist) leaving everything else implicitly or explicitly denied (The Blacklist). Granted, there will always be some that fall in the middle (The Greylist) but those should be reserved for administrative decision.

Our Clients