3B Data Security Blog
-
Top Cyber Threats to Look Out for This Black Friday
Black Friday is not just a day for great deals, but also a peak season for cybercriminals. Awareness is key to staying safe. In this blog, we’ll dive into the most common cyber threats you should be aware of during Black Friday.
-
What Is a Credential Stuffing Attack and How Does It Work?
Credential stuffing is a cyber attack method in which attackers use lists of stolen account credentials (which typically consist of usernames/email addresses and the corresponding password) to gain unauthorised access to web application user accounts. The attackers use bots (software applications that are programmed to do specific tasks) to automate large-scale login requests using the…
-
Different Types of Penetration Testing and How To Choose the Right One for Your Business
Penetration testing, also known as “pen testing,” is a cyber security practice that involves simulating real-world cyber attacks to identify and exploit vulnerabilities in your systems. By mimicking the tactics and methods used by malicious attackers, penetration testing provides organisations with a clear understanding of their security weaknesses. This proactive approach helps businesses strengthen their…
-
UBDS Group acquires 3B Data Security in its mission to become cyber security powerhouse
London, UK, 4 November 2024 – Leading technology services incubator, UBDS Group, has acquired cyber security specialist 3B Data Security for an undisclosed sum, expanding its security capabilities to become a significant force in the UK cyber security market. Under the terms of the deal, Cambridge-based 3B Data Security will retain its autonomy, including its…
-
From Tabletop to Real-World Testing: The Value of Cyber Incident Exercises
Until recently, tabletop cyber security exercises were a staple of any serious approach to maintaining and improving an organisation’s security posture. Tabletop exercises engage key stakeholders within the organisation such as senior management, IT and SOC teams, HR, PR and legal staff. Through a series of roleplay-based exercises (usually called injects) the stakeholders are encouraged…
-
3B Data Security Events
We’re excited to share our upcoming events! Our events are designed to connect professionals from various industries, offering you the chance to expand your network and gain practical, engaging advice on cyber security best practices. For many of our events, we team up with a range of industry experts to give you fresh perspectives and…
-
10 Years of Cyber Essentials: The Benefits of Certification
This year marks the 10th anniversary of the NCSC Cyber Essentials certification. Cyber Essentials is a UK government-backed scheme designed to help organisations protect themselves against a range of the most common cyber attacks. Achieving Cyber Essentials certification demonstrates that your organisation has implemented essential security measures to safeguard its IT infrastructure. Since its inception…
-
What’s Happening With PCI DSS Version 4 for E-Commerce?
The Payment Card Industry Data Security Standard (PCI DSS) has seen some changes over the last 12 months, not least the adoption of a new version of the standard, version 4.0. This is the set of controls that must be observed when assessing a payment environment for suitable levels of security and management, as the…
-
3B Data Security Are a CIR L2 Provider!
We’re excited to announce that 3B Data Security are a Cyber Incident Response Level 2 NCSC Assured Service Provider!
-
Are Your IoT Devices UK Compliant the Deadline is April 29th
With the April 29th deadline rapidly approaching, UK manufacturers, distributors, and importers of internet-connected devices are on a tight schedule to comply with the Product Security and Telecommunications Infrastructure (PSTI) Act.
- Top Cyber Threats to Look Out for This Black Friday
- What Is a Credential Stuffing Attack and How Does It Work?
- Different Types of Penetration Testing and How To Choose the Right One for Your Business
- UBDS Group acquires 3B Data Security in its mission to become cyber security powerhouse
- From Tabletop to Real-World Testing: The Value of Cyber Incident Exercises