Fordway Blog.
Get the latest Fordway news, industry insights and opinions on IT topics such as security and cloud computing.
Team Spotlight: Shaida Mahmood
We caught up with Shaida, our L2 engineer who has returned to Fordway after a five-year career break. As a female engineer and a working parent, Shaida’s story is inspiring.
Reflecting on the Elizabeth Line in honour of Her Majesty
Looking back at our work on the Crossrail project and the Elizabeth Line in memory of the late Queen Elizabeth II.
Why cloud is not always a panacea for digital transformation
Organisations are continually looking for ways to reduce the time and cost of managing their IT so they can focus on new initiatives to develop their business. Is cloud the solution, able to provide what outsourcing promised but ultimately failed to deliver?
Zero Trust: Does cybersecurity’s favourite buzzword live up to the hype?
The Zero Trust concept, along with SD-WAN and SASE (Secure Access Service Edge) have become widely discussed in the last couple of years to meet the cybersecurity challenges of flexible working and widespread cloud adoption. Â
How to use ITIL 4 for best practice supplier management
This blog will discuss the purpose and scope of ITIL 4 and how to use this to enhance your supplier management.
Azure: The trusted cloud platform for Utilities
Utility companies that have embarked on their journey to Microsoft Azure, have transformed business models entirely.
Azure vs AWS and Google Cloud: What is Best for You in 2022?Â
As the battle of the cloud continues, Amazon, Microsoft and Google still dominate the global cloud computing market, helping businesses to accelerate their digital transformation in a revolutionary shift away from traditional legacy systems.
Whitepaper: Managing information security risk in a digital world
We’ve put together a whitepaper to help organizations combat security risks in the new digital era of hybrid working.
Do we still need backups?
Have you ever had the heart-sinking feeling that you’ve lost all your data? This article explores how to get proactive about your data security and ensure your IT systems are running smoothly.