3B Data Security Blog

  • Different Types of Penetration Testing and How To Choose the Right One for Your Business

    Different Types of Penetration Testing and How To Choose the Right One for Your Business

    What is Penetration Testing? Penetration testing, also known as ethical hacking or ‘pentesting’, is a cyber security practice that involves simulating real-world cyber attacks to evaluate an organisation’s security defences. The purpose is to identify vulnerabilities in systems, networks, or applications before malicious actors can exploit them. Penetration testing mimics the tactics and strategies used…

  • Understanding Cyber Threats and Their Impact on Businesses

    Understanding Cyber Threats and Their Impact on Businesses

    In today’s digital landscape, businesses face an ever-growing range of cyber threats that can cause significant harm and disruption to business operations. Cyber threats involve malicious activities aimed at compromising the security of systems, networks, and data. These threats can disrupt operations, cause financial losses, damage reputations, and expose sensitive information.    As businesses increasingly rely…

  • What Is eDiscovery and How Does It Work?

    What Is eDiscovery and How Does It Work?

    eDiscovery, short for “electronic discovery,” is the process of identifying, collecting, preserving, and analysing electronically stored information (ESI) for use as evidence in legal proceedings, investigations, or regulatory compliance. As much of today’s communication and data storage occurs in digital formats, eDiscovery has become essential in the legal landscape, particularly when seeking to obtain relevant…

  • DORA (Digital Operational Resilience Act) – What You Need To Know

    DORA (Digital Operational Resilience Act) – What You Need To Know

    DORA, the Digital Operational Resilience Act, is a regulation introduced by the European Union (EU) aimed at strengthening cyber resilience within the financial sector. It is part of the broader EU digital finance strategy, designed to ensure that financial institutions can withstand, respond to, and recover from ICT (Information and Communication Technology)-related disruptions or threats,…

  • Top Cyber Threats to Look Out for This Black Friday

    Top Cyber Threats to Look Out for This Black Friday

    Black Friday is not just a day for great deals, but also a peak season for cybercriminals. Awareness is key to staying safe. In this blog, we’ll dive into the most common cyber threats you should be aware of during Black Friday.

  • What Is a Credential Stuffing Attack and How Does It Work?

    What Is a Credential Stuffing Attack and How Does It Work?

    Credential stuffing is a cyber attack method in which attackers use lists of stolen account credentials (which typically consist of usernames/email addresses and the corresponding password) to gain unauthorised access to web application user accounts. The attackers use bots (software applications that are programmed to do specific tasks) to automate large-scale login requests using the…

  • UBDS Group acquires 3B Data Security in its mission to become cyber security powerhouse

    UBDS Group acquires 3B Data Security in its mission to become cyber security powerhouse

    London, UK, 4 November 2024 – Leading technology services incubator, UBDS Group, has acquired cyber security specialist 3B Data Security for an undisclosed sum, expanding its security capabilities to become a significant force in the UK cyber security market. Under the terms of the deal, Cambridge-based 3B Data Security will retain its autonomy, including its…

  • From Tabletop to Real-World Testing: The Value of Cyber Incident Exercises 

    From Tabletop to Real-World Testing: The Value of Cyber Incident Exercises 

    Until recently, tabletop cyber security exercises were a staple of any serious approach to maintaining and improving an organisation’s security posture. Tabletop exercises engage key stakeholders within the organisation such as senior management, IT and SOC teams, HR, PR and legal staff. Through a series of roleplay-based exercises (usually called injects) the stakeholders are encouraged…

  • 3B Data Security Events

    3B Data Security Events

    We’re excited to share our upcoming events! Our events are designed to connect professionals from various industries, offering you the chance to expand your network and gain practical, engaging advice on cyber security best practices. For many of our events, we team up with a range of industry experts to give you fresh perspectives and…

  • 10 Years of Cyber Essentials: The Benefits of Certification

    10 Years of Cyber Essentials: The Benefits of Certification

    This year marks the 10th anniversary of the NCSC Cyber Essentials certification. Cyber Essentials is a UK government-backed scheme designed to help organisations protect themselves against a range of the most common cyber attacks. Achieving Cyber Essentials certification demonstrates that your organisation has implemented essential security measures to safeguard its IT infrastructure. Since its inception…