Fordway Blog

Tackling the ‘unknown unknowns’ of cyber security

[fa icon="calendar'] May 6, 2021 2:46:51 PM / by Tim Fookes posted in Security, Technology, Cyber Security, Risk Management, Microsoft Sentinel, Managed Services


What are the key technologies -that can protect your business from cyber-attacks 

Most businesses would look for technologies such as threat detection, anti-malware, firewalls, and antivirus softwareThe choice comes down to how often your systems are patched, or what policies and procedures are in place.  

Read More [fa icon="long-arrow-right"]

Using zero trust to secure the finance sector

[fa icon="calendar'] Dec 2, 2020 3:14:54 PM / by Ashley Denness posted in Security, enterprise cloud

During the pandemic the traditionally office-based finance sector has quickly adapted to remote working – and now many employees may not be returning to the office for some time, if at all.

Read More [fa icon="long-arrow-right"]

Which cyber threats should you prepare for?

[fa icon="calendar'] Nov 14, 2019 10:08:16 AM / by Neville Armstrong posted in Security

With cyber threats from malware and cyber attacks to phishing and social engineering continually in the headlines, it can be difficult to assess the actual risks to your organisation so you can take appropriate action to mitigate them. In my view, you can’t manage anything that you don’t understand – so what is actually out there, and how vulnerable is your organisation to the different threats?

Read More [fa icon="long-arrow-right"]

Why Cyber Essentials is a good starting point

[fa icon="calendar'] Nov 7, 2019 3:09:44 PM / by Neville Armstrong posted in Security, Ransomeware, incident response, CISO, Security


This week the Government launched a review to find out what’s needed to make UK business leaders take cyber security seriously. In our view, a good place to start is the government’s Cyber Essentials scheme, which is based on advice from the UK’s National Cyber Security Centre (NCSC), part of GCHQ.

Read More [fa icon="long-arrow-right"]

Using analytics to understand user access behaviour

[fa icon="calendar'] Oct 23, 2019 10:00:00 AM / by Neville Armstrong posted in Security

In a digital world, network security moves from the organisation’s perimeter to the user. The most effective way to do this is to create a zero trust network, implementing least privilege and default deny policies for each user and each system.

Read More [fa icon="long-arrow-right"]

User testing for practical endpoint security

[fa icon="calendar'] Jun 19, 2019 2:51:41 PM / by Richard Green posted in Security, Data Protection, Fordway


Security is the one topic that everyone loves to hate. Sure it’s exciting to read about the vulnerabilities, but sometimes implementing the fixes can be a real headache.

Read More [fa icon="long-arrow-right"]

Creating a Cyber Security Culture That Works

[fa icon="calendar'] Jun 5, 2019 11:37:33 AM / by Caroline Houlden posted in Security, Cloud Security

With new cyber threats constantly emerging, we’re often asked for advice on how to stay one step ahead of the hackers and cyber criminals. A good first step is to review your organisation’s cyber security against five key controls set out in the National Cyber Security Centre’s Cyber Essentials scheme (see our recent blog), and it’s also vital to ensure that everyone in your organisation is prepared in case the worst happens. 

Find out how you can benchmark your IT security

Read More [fa icon="long-arrow-right"]

Five steps to enterprise security

[fa icon="calendar'] May 22, 2019 2:51:39 PM / by Caroline Houlden posted in Security, Ransomeware, incident response, CISO, Security, Ransomware, Cloud Security


If you were looking for help to improve your business’s cyber security, a good place to start would be the UK’s National Cyber Security Centre, part of GCHQ, whose role is to keep the country secure against cyber attacks. So when they provide free advice, you’d expect most businesses to be rushing to implement it. However, you’d be wrong. The NCSC has developed a security tool to help organisations protect themselves against the most common cyber threats, but although it’s been available for almost five years, less than ten per cent of UK businesses have implemented it.

Read More [fa icon="long-arrow-right"]

5 Security and Compliance takeaways for enabling secure digital transformation

[fa icon="calendar'] Apr 4, 2019 10:42:55 AM / by Caroline Houlden posted in Insider, GDPR, Security, IT Strategy, Cloud Security, IT Transformation, Fordway, Strategy

You want to innovate. To transform your organisation with new services and help achieve the top-line. Security and compliance can seem like endless red tape and bureaucracy that simply get in the way.

Read More [fa icon="long-arrow-right"]

Tips for developing a data security policy

[fa icon="calendar'] Oct 17, 2017 11:10:59 AM / by Neville Armstrong posted in GDPR, Security, Governance

With GDPR on the horizon, now is a good time to review your data security policy. The first step is to take a holistic look at your entire infrastructure, from how data is created or acquired to how it is valued, stored, accessed and disposed of. This includes data coming in from customers, partners and suppliers; data created within the organisation, such as presentations and reports; and data that goes out, such as invoices and proposals.

Read More [fa icon="long-arrow-right"]