Home / How It Works
You do not need a technical education to get this right. You need one person to look at your Google Workspace, tell you plainly what is wrong, fix it to a defensible standard, and keep watch after the project is done. This is how GetBulwark does that.
None of them visible in day-to-day operations. None of them tripping any alarms. All of them exploitable — by a former employee, a phishing campaign, or a ransomware group that scanned your domain this morning. The damage does not announce itself until after it has already happened.
The average UK SMB takes over three weeks to fully revoke a departing employee's access. During that window, their Google account — email history, Drive files, shared documents, client data — remains live and accessible.
They may have already forwarded things. You probably cannot name every account still active without checking right now.
Without DMARC set to reject, anyone can send email that appears to come from your domain. Your clients, suppliers, and staff would have no technical way to distinguish the real thing from fraud.
Spoofed invoices, fake payment instruction changes, credential phishing — all using your name and your brand.
Google Drive is not a backup. If your Workspace account is compromised, ransomware encrypted, or an admin accidentally deletes a Shared Drive, the "cloud" and the recovery copy are the same thing.
AFI backs up at item level, outside Google's infrastructure, with independent credentials. Google's Vault does not replace it.
Four steps. A clear scope at each stage. No ambiguity about what happens next, what it costs, or who is doing it.
A 45-minute manual review of your Google Workspace. Twenty controls across identity, email authentication, data security, and devices — scored out of 215 and delivered as a written PDF. Yours to keep, regardless of what happens next.
A short call to walk through the report together. What is genuinely critical, what can wait, what a fix actually involves, and whether the work sits clearly in the Google Workspace lane. If it does not, you will hear that directly.
The findings become a fixed worklist. Every critical gap is closed: MFA enforced, DMARC corrected, leavers removed, monitoring deployed, backup configured. The audit is re-run at the end. A before-and-after score documents what changed.
The environment does not go quiet after the project. Every month: security controls re-checked, new starters onboarded, leavers revoked, a scored PDF delivered. You get visibility and proof — not just a recurring bill.
Audit findings do not sit in a report. They become a sequenced worklist, starting with the highest-risk items. By the end of week four, the environment has a documented before-and-after score and a clean baseline for managed monthly to build on.
The audit findings become a fixed worklist. Delegated admin access is set up and the order of changes is agreed before anything is touched.
The highest-risk items move first: MFA, admin roles, leavers, and email authentication.
Endpoint monitoring and backup are deployed so the environment is not relying on Google defaults alone.
The audit is re-run, the before-and-after score is documented, and the environment moves into managed monthly.
The technical changes matter. The reduction in uncertainty matters more. By the end of month one, someone knows exactly what your environment looks like — and can prove it.
Before
After
Most IT providers sell you the senior consultant in the pitch meeting and deliver the junior helpdesk three weeks later. GetBulwark works differently — not as a policy, but because the model does not have that problem.
The specialist who runs your audit writes the report, manages the hardening project, owns the monthly review, and answers the phone when something needs attention. That does not change over time. There is no account manager between you and the work.
At this scale, the service works because it is personal. You always know who is responsible. There is no ambiguity about whose job it is when something needs attention — and no situation where "I'll escalate that" is the answer.
Callum Fraser
Founder · GetBulwark
Promise 01
Every engagement starts with a free 20-point manual review. The written report is yours whether you work with GetBulwark afterwards or not. No conditions. No follow-up lock-in. If your setup is already strong, you will hear that directly.
Promise 02
Every hardening project ends with a re-run audit. If a finding identified in the original report is not resolved, the fix is included at no extra charge. The deliverable is a genuinely improved score — not just a list of completed tasks.
Promise 03
If you already have strong internal IT, the work sits outside the Google Workspace lane, or a different specialist would serve you better — you will be told plainly and pointed somewhere useful. No pressure, no pivot to a watered-down version of the service.
GetBulwark uses a fixed stack — the same tools for every managed client. Not because it is convenient, but because these are the right tools for the job and the consistency means they are configured correctly every time.
Huntress monitors every managed device around the clock. If something suspicious happens — malware, an intrusion attempt, a compromised account being used at 3am — a real human analyst at the SOC investigates and contains it. Not an automated alert. A person.
Average containment time: 8 minutes. Purpose-built for SMBs, not a scaled-down enterprise tool.
Huntress — Managed EDR + SOCAFI backs up Drive, Gmail, and Shared Drives to independent storage with independent credentials. Item-level recovery means you can restore a single email or a specific file — not just an all-or-nothing account restore.
If the Google account is compromised, the backup is not. That separation is the point.
AFI — Workspace BackupSPF, DKIM, and DMARC configured to reject. Once this is set correctly, nobody can send email that appears to come from your domain — no spoofed invoices, no fake payment instructions, no phishing campaigns wearing your brand.
DMARC at reject is the standard. Monitoring is included. Most businesses are on "none" or "quarantine" — neither stops spoofing.
SPF · DKIM · DMARC — Reject policySample Output
A scored PDF covering all 20 controls. See exactly what you receive before booking.
Sample Output
The scored PDF delivered every month. What gets checked, what gets reported, what changes.
Security Log
Anonymised case studies: what was found, what was fixed, what the environment looked like before and after.
45 minutes. A written report scored out of 215. Yours to keep. If there is nothing critical, you will hear that. If there is, you will know exactly what it is and what fixing it looks like.