Fordway Blog

Which cyber threats should you prepare for?

[fa icon="calendar'] Nov 14, 2019 10:08:16 AM / by Neville Armstrong posted in Security

With cyber threats from malware and cyber attacks to phishing and social engineering continually in the headlines, it can be difficult to assess the actual risks to your organisation so you can take appropriate action to mitigate them. In my view, you can’t manage anything that you don’t understand – so what is actually out there, and how vulnerable is your organisation to the different threats?

Read More [fa icon="long-arrow-right"]

Why Cyber Essentials is a good starting point

[fa icon="calendar'] Nov 7, 2019 3:09:44 PM / by Neville Armstrong posted in Security, Ransomeware, incident response, CISO, Security

 

This week the Government launched a review to find out what’s needed to make UK business leaders take cyber security seriously. In our view, a good place to start is the government’s Cyber Essentials scheme, which is based on advice from the UK’s National Cyber Security Centre (NCSC), part of GCHQ.

Read More [fa icon="long-arrow-right"]

Using analytics to understand user access behaviour

[fa icon="calendar'] Oct 23, 2019 10:00:00 AM / by Neville Armstrong posted in Security

In a digital world, network security moves from the organisation’s perimeter to the user. The most effective way to do this is to create a zero trust network, implementing least privilege and default deny policies for each user and each system.

Read More [fa icon="long-arrow-right"]

User testing for practical endpoint security

[fa icon="calendar'] Jun 19, 2019 2:51:41 PM / by Richard Green posted in Security, Data Protection, Fordway

 

Security is the one topic that everyone loves to hate. Sure it’s exciting to read about the vulnerabilities, but sometimes implementing the fixes can be a real headache.

Read More [fa icon="long-arrow-right"]

Creating a Cyber Security Culture That Works

[fa icon="calendar'] Jun 5, 2019 11:37:33 AM / by Caroline Houlden posted in Security, Cloud Security

With new cyber threats constantly emerging, we’re often asked for advice on how to stay one step ahead of the hackers and cyber criminals. A good first step is to review your organisation’s cyber security against five key controls set out in the National Cyber Security Centre’s Cyber Essentials scheme (see our recent blog), and it’s also vital to ensure that everyone in your organisation is prepared in case the worst happens. 

Find out how you can benchmark your IT security

Read More [fa icon="long-arrow-right"]

Five steps to enterprise security

[fa icon="calendar'] May 22, 2019 2:51:39 PM / by Caroline Houlden posted in Security, Ransomeware, incident response, CISO, Security, Ransomware, Cloud Security

 

If you were looking for help to improve your business’s cyber security, a good place to start would be the UK’s National Cyber Security Centre, part of GCHQ, whose role is to keep the country secure against cyber attacks. So when they provide free advice, you’d expect most businesses to be rushing to implement it. However, you’d be wrong. The NCSC has developed a security tool to help organisations protect themselves against the most common cyber threats, but although it’s been available for almost five years, less than ten per cent of UK businesses have implemented it.

Read More [fa icon="long-arrow-right"]

5 Security and Compliance takeaways for enabling secure digital transformation

[fa icon="calendar'] Apr 4, 2019 10:42:55 AM / by Caroline Houlden posted in Insider, GDPR, Security, IT Strategy, Cloud Security, IT Transformation, Fordway, Strategy



You want to innovate. To transform your organisation with new services and help achieve the top-line. Security and compliance can seem like endless red tape and bureaucracy that simply get in the way.

Read More [fa icon="long-arrow-right"]

Tips for developing a data security policy

[fa icon="calendar'] Oct 17, 2017 11:10:59 AM / by Neville Armstrong posted in GDPR, Security, Governance

With GDPR on the horizon, now is a good time to review your data security policy. The first step is to take a holistic look at your entire infrastructure, from how data is created or acquired to how it is valued, stored, accessed and disposed of. This includes data coming in from customers, partners and suppliers; data created within the organisation, such as presentations and reports; and data that goes out, such as invoices and proposals.

Read More [fa icon="long-arrow-right"]

The Petya/NotPetya ransomware attack

[fa icon="calendar'] Jul 6, 2017 9:58:33 AM / by James Mason posted in Security, managed cloud, Ransomware, Incident Response, Fordway Managed Services

With last week’s Petya/NotPetya malware coming so soon after the Wannacry infection which affected more than 230,000 computers in over 150 countries, every organisation needs to assess their ability to cope with ransomware. That means considering a range of factors, from your patching regime to your back-up and disaster recovery provision. It only takes one user to accidentally click on an infected attachment and you could find yourself testing your DR plan!

Read More [fa icon="long-arrow-right"]

Battling GDPR compliance?

[fa icon="calendar'] Mar 17, 2017 4:29:19 PM / by Ashley Denness posted in GDPR, Security


 

 

You can imagine it now. If the world of IT security were to be played out as a pantomime today, the seeming villain of the piece would definitely be GDPR. Picture it, the face of the CISO when the crowd scream “It’s behind you!” as GDPR suddenly appears. Our hero knows that GDPR is lurking behind him but he is not quite sure a) how much of a threat it will be to him and b) exactly what he has to do to combat it.


Read More [fa icon="long-arrow-right"]