Fordway Blog

Using analytics to understand user access behaviour

[fa icon="calendar'] Oct 23, 2019 10:00:00 AM / by Neville Armstrong posted in Security

In a digital world, network security moves from the organisation’s perimeter to the user. The most effective way to do this is to create a zero trust network, implementing least privilege and default deny policies for each user and each system.

Read More [fa icon="long-arrow-right"]

User testing for practical endpoint security

[fa icon="calendar'] Jun 19, 2019 2:51:41 PM / by Richard Green posted in Security, Data Protection, Fordway


Security is the one topic that everyone loves to hate. Sure it’s exciting to read about the vulnerabilities, but sometimes implementing the fixes can be a real headache.

Read More [fa icon="long-arrow-right"]

Creating a Cyber Security Culture That Works

[fa icon="calendar'] Jun 5, 2019 11:37:33 AM / by Caroline Houlden posted in Security, Cloud Security

With new cyber threats constantly emerging, we’re often asked for advice on how to stay one step ahead of the hackers and cyber criminals. A good first step is to review your organisation’s cyber security against five key controls set out in the National Cyber Security Centre’s Cyber Essentials scheme (see our recent blog), and it’s also vital to ensure that everyone in your organisation is prepared in case the worst happens. 

Find out how you can benchmark your IT security

Read More [fa icon="long-arrow-right"]

Five steps to enterprise security

[fa icon="calendar'] May 22, 2019 2:51:39 PM / by Caroline Houlden posted in Security, Ransomeware, incident response, CISO, Security, Ransomware, Cloud Security


If you were looking for help to improve your business’s cyber security, a good place to start would be the UK’s National Cyber Security Centre, part of GCHQ, whose role is to keep the country secure against cyber attacks. So when they provide free advice, you’d expect most businesses to be rushing to implement it. However, you’d be wrong. The NCSC has developed a security tool to help organisations protect themselves against the most common cyber threats, but although it’s been available for almost five years, less than ten per cent of UK businesses have implemented it.

Read More [fa icon="long-arrow-right"]

5 Security and Compliance takeaways for enabling secure digital transformation

[fa icon="calendar'] Apr 4, 2019 10:42:55 AM / by Caroline Houlden posted in Insider, GDPR, Security, IT Strategy, Cloud Security, IT Transformation, Fordway, Strategy

You want to innovate. To transform your organisation with new services and help achieve the top-line. Security and compliance can seem like endless red tape and bureaucracy that simply get in the way.

Read More [fa icon="long-arrow-right"]

Tips for developing a data security policy

[fa icon="calendar'] Oct 17, 2017 11:10:59 AM / by Neville Armstrong posted in GDPR, Security, Governance

With GDPR on the horizon, now is a good time to review your data security policy. The first step is to take a holistic look at your entire infrastructure, from how data is created or acquired to how it is valued, stored, accessed and disposed of. This includes data coming in from customers, partners and suppliers; data created within the organisation, such as presentations and reports; and data that goes out, such as invoices and proposals.

Read More [fa icon="long-arrow-right"]

The Petya/NotPetya ransomware attack

[fa icon="calendar'] Jul 6, 2017 9:58:33 AM / by James Mason posted in Security, managed cloud, Ransomware, Incident Response, Fordway Managed Services

With last week’s Petya/NotPetya malware coming so soon after the Wannacry infection which affected more than 230,000 computers in over 150 countries, every organisation needs to assess their ability to cope with ransomware. That means considering a range of factors, from your patching regime to your back-up and disaster recovery provision. It only takes one user to accidentally click on an infected attachment and you could find yourself testing your DR plan!

Read More [fa icon="long-arrow-right"]

Battling GDPR compliance?

[fa icon="calendar'] Mar 17, 2017 4:29:19 PM / by Ashley Denness posted in GDPR, Security



You can imagine it now. If the world of IT security were to be played out as a pantomime today, the seeming villain of the piece would definitely be GDPR. Picture it, the face of the CISO when the crowd scream “It’s behind you!” as GDPR suddenly appears. Our hero knows that GDPR is lurking behind him but he is not quite sure a) how much of a threat it will be to him and b) exactly what he has to do to combat it.

Read More [fa icon="long-arrow-right"]

The importance of people and process in the fight to secure NHS data

[fa icon="calendar'] Jan 28, 2017 12:01:00 AM / by Navtej Kalkat posted in Security, Disaster Recovery, IT Strategy

NHS Cloud and IT Consultancy - Fordway Blog

The computer virus which affected Northern Lincolnshire and Goole NHS Foundation Trust in November is a further reminder that NHS organisations need to remain constantly on their guard against security breaches. As no ransom was demanded, it’s likely to have been a random attack, but reports suggest that 28 trusts have been hit by ransomware attacks in the last year. Additionally, the NHS was the UK’s biggest victim of data breaches in 2015 according to the Information Commissioner’s Office.

Read More [fa icon="long-arrow-right"]