Author: Annabelle Ilsley

  • What Is eDiscovery and How Does It Work?

    What Is eDiscovery and How Does It Work?

    eDiscovery, short for “electronic discovery,” is the process of identifying, collecting, preserving, and analysing electronically stored information (ESI) for use as evidence in legal proceedings, investigations, or regulatory compliance. As much of today’s communication and data storage occurs in digital formats, eDiscovery has become essential in the legal landscape, particularly when seeking to obtain relevant…

  • Top Cyber Threats to Look Out for This Black Friday

    Top Cyber Threats to Look Out for This Black Friday

    Black Friday is not just a day for great deals, but also a peak season for cybercriminals. Awareness is key to staying safe. In this blog, we’ll dive into the most common cyber threats you should be aware of during Black Friday.

  • UBDS Group acquires 3B Data Security in its mission to become cyber security powerhouse

    UBDS Group acquires 3B Data Security in its mission to become cyber security powerhouse

    London, UK, 4 November 2024 – Leading technology services incubator, UBDS Group, has acquired cyber security specialist 3B Data Security for an undisclosed sum, expanding its security capabilities to become a significant force in the UK cyber security market. Under the terms of the deal, Cambridge-based 3B Data Security will retain its autonomy, including its…

  • 3B Data Security Events

    3B Data Security Events

    We’re excited to share our upcoming events! Our events are designed to connect professionals from various industries, offering you the chance to expand your network and gain practical, engaging advice on cyber security best practices. For many of our events, we team up with a range of industry experts to give you fresh perspectives and…

  • 10 Years of Cyber Essentials: The Benefits of Certification

    10 Years of Cyber Essentials: The Benefits of Certification

    This year marks the 10th anniversary of the NCSC Cyber Essentials certification. Cyber Essentials is a UK government-backed scheme designed to help organisations protect themselves against a range of the most common cyber attacks. Achieving Cyber Essentials certification demonstrates that your organisation has implemented essential security measures to safeguard its IT infrastructure. Since its inception…

  • 3B Data Security Are a CIR L2 Provider! 

    3B Data Security Are a CIR L2 Provider! 

    We’re excited to announce that 3B Data Security are a Cyber Incident Response Level 2 NCSC Assured Service Provider! 

  • Are Your IoT Devices UK Compliant the Deadline is April 29th

    Are Your IoT Devices UK Compliant the Deadline is April 29th

    With the April 29th deadline rapidly approaching, UK manufacturers, distributors, and importers of internet-connected devices are on a tight schedule to comply with the Product Security and Telecommunications Infrastructure (PSTI) Act.

  • PCI DSS Deadline Approaching – What You Need to Know

    PCI DSS Deadline Approaching – What You Need to Know

    PCI DSS Version 3.2.1 is scheduled to retire on the 31st of March 2024, with Version 4.0 set to take its place. If your PCI compliance date falls after 1st April 2024, then you will need to complete an assessment against version 4.0 of the standard. Full adherence with the standard is expected by 31 March…

  • General Cyber Security Practices to Strengthen Your Defence

    General Cyber Security Practices to Strengthen Your Defence

    Implementing general security practices can significantly enhance your organisation’s resilience against cyber threats. We take a look at some key practices, along with their impact on security.

  • Identifying IoT Security Risks in Your Business

    Identifying IoT Security Risks in Your Business

    The Internet of Things (IoT) is transforming how businesses work by connecting everyday objects to the internet, enabling them to send and receive data. This technology boosts efficiency and allows for advanced data analysis. In this blog post, we take a look at the common security risks facing IoT devices, and preventative measures you can…