Cyber Security & Compliance

Protect your business and its data from
Ransomware, Hackers and Insider Threats


Roadmap provide tailored Cyber Security services and products to meet the needs of your business. We recognise that not every business is the same and the definition of security can vary greatly. Our range of solutions cover the needs of businesses who just wish to tighten up their working practises all the way to businesses who need to lock down all of their systems and data to comply with internationally recognised compliance such as ISO27001 and SOC 2.

Tailored


Cyber
Essentials +

Cyber Essentials+ helps you to guard against the most common cyber threats and demonstrate your commitment to cyber security.
We advise all our customers to work towards Cyber Essentials + Certification.

Certification will help demonstrate to your suppliers, staff, customers and any new customers that you have cyber security measures in place. Roadmap can help you step by step through the process, defining the scope, ensuring the IT at your premises meets the requirements and being onsite during the audit to answer any questions the auditor may have.

Certification is also a positive step towards demonstrating you are protecting your data for the GDPR.


Vulnerability testing

If you have a requirement to maintain an ISO 27001 certification or you just need to make sure vulnerabilities are identified and resolved as part of your ongoing IT security goals then our vulnerability testing services will help you achieve this. We can help you quickly and accurately identify software flaws, missing patches, malware, and misconfigurations, across a variety of operating systems, devices and applications on your network. We can then provide a report and schedule any works to correct areas of concern.


Ransomware

Ransomware is malware that uses encryption to prevent the victim from accessing their files or devices. Often designed to spread across an organisation and can quickly cause significant disruption, expense and damage to a business.

As with any protection solution a defence in depth approach is best and multiple systems protecting different parts of your IT infrastructure will give you the best chance of protecting your business from a Ransomware attack.

It is also prudent to have a disaster recovery plan for a ransomware attack and systems in place that would enable you to recover from an attack without having to pay a ransom.

Roadmap have a number of products and services available to protect your data and systems. In addition to this the services below will also help to identify and alleviate any potential risks.


Risk Assessments

A fundamental part of any ISMS or IT security review is a risk assessment and treatment plan that looks at all the IT assets in your business as well as your working processes. Roadmap use a standards based approach to determine the risks for the confidentiality, integrity and availability of your data or systems. On completion you will have a clear report highlighting risks along with treatment options to reduce the risks should they be higher than you would like. Roadmap can complete the full assessment and any treatment options that might be required.