Cyber Security & Compliance
Protect your business and its data from Ransomware, Hackers and Insider Threats
Roadmap offer tailored Cyber Security services and products so that they meet the needs of your business. We recognise that not every business is the same and security requirements can vary . Our range of solutions meet the needs of businesses who just wish to tighten up their working practises all the way through to businesses who need to lock down all of their systems and data to comply with internationally recognised compliance such as ISO27001 and SOC 2.
Bespoke Approach
Cyber Essentials+ helps you to guard against the most common cyber threats and demonstrate your commitment to cyber security.
It is recommended that all businesses should have a minimum of Cyber Essentials + Certification as a level of compliance.
Certification will help demonstrate to your suppliers, staff, customers and any new customers that you have cyber security measures in place. Roadmap can help you step by step through the process, defining the scope, ensuring the IT at your premises meets the requirements and being onsite during the audit to answer any questions the auditor may have.
Certification is also a positive step towards demonstrating you are protecting your data for the GDPR.
Roadmap will fully manage your Cyber Essentials or Cyber Essentials + certification. This involves:
- Purchasing the Cyber Essentials Package
- Defining the scope
- Answering and submitting questionnaire to IASME
- Remediation of any systems or processes that are required to pass the audit
- Implementation of new systems required to pass the audit
- Organising the audit
- Working with auditor on the day of audit
- Remediation if required post audit
- Supply of certification
- Certification Reminder
Vulnerability testing
If you have a requirement to maintain an ISO 27001 certification or you just need to make sure vulnerabilities are identified and resolved as part of your ongoing IT security goals then our vulnerability testing services will help you achieve this. We can help you quickly and accurately identify software flaws, missing patches, malware, and misconfigurations, across a variety of operating systems, devices and applications on your network. We can then provide a report and schedule any works to correct areas of concern.
Ransomware
Ransomware is malware that uses encryption to prevent the victim from accessing their files or devices. Often designed to spread across an organisation and can quickly cause significant disruption, expense and damage to a business.
As with any protection solution a defence in depth approach is best and multiple systems protecting different parts of your IT infrastructure will give you the best chance of protecting your business from a Ransomware attack.
It is also prudent to have a disaster recovery plan for a ransomware attack and systems in place that would enable you to recover from an attack without having to pay a ransom.
Roadmap have a number of products and services available to protect your data and systems. In addition to this the services below will also help to identify and alleviate any potential risks.
Risk Assessments
A fundamental part of any ISMS or IT security review is a risk assessment and treatment plan that looks at all the IT assets in your business as well as your working processes. Roadmap use a standards based approach to determine the risks for the confidentiality, integrity and availability of your data or systems. On completion you will have a clear report highlighting risks along with treatment options to reduce the risks should they be higher than you would like. Roadmap can complete the full assessment and any treatment options that might be required.