3B Data Security Blog

  • What Is a Credential Stuffing Attack and How Does It Work?

    What Is a Credential Stuffing Attack and How Does It Work?

    Credential stuffing is a cyber attack method in which attackers use lists of stolen account credentials (which typically consist of usernames/email addresses and the corresponding password) to gain unauthorised access to web application user accounts. The attackers use bots (software applications that are programmed to do specific tasks) to automate large-scale login requests using the…

  • UBDS Group acquires 3B Data Security in its mission to become cyber security powerhouse

    UBDS Group acquires 3B Data Security in its mission to become cyber security powerhouse

    London, UK, 4 November 2024 – Leading technology services incubator, UBDS Group, has acquired cyber security specialist 3B Data Security for an undisclosed sum, expanding its security capabilities to become a significant force in the UK cyber security market. Under the terms of the deal, Cambridge-based 3B Data Security will retain its autonomy, including its…

  • From Tabletop to Real-World Testing: The Value of Cyber Incident Exercises 

    From Tabletop to Real-World Testing: The Value of Cyber Incident Exercises 

    Until recently, tabletop cyber security exercises were a staple of any serious approach to maintaining and improving an organisation’s security posture. Tabletop exercises engage key stakeholders within the organisation such as senior management, IT and SOC teams, HR, PR and legal staff. Through a series of roleplay-based exercises (usually called injects) the stakeholders are encouraged…

  • 3B Data Security Events

    3B Data Security Events

    We’re excited to share our upcoming events! Our events are designed to connect professionals from various industries, offering you the chance to expand your network and gain practical, engaging advice on cyber security best practices. For many of our events, we team up with a range of industry experts to give you fresh perspectives and…

  • 10 Years of Cyber Essentials: The Benefits of Certification

    10 Years of Cyber Essentials: The Benefits of Certification

    This year marks the 10th anniversary of the NCSC Cyber Essentials certification. Cyber Essentials is a UK government-backed scheme designed to help organisations protect themselves against a range of the most common cyber attacks. Achieving Cyber Essentials certification demonstrates that your organisation has implemented essential security measures to safeguard its IT infrastructure. Since its inception…

  • What’s Happening With PCI DSS Version 4 for E-Commerce?

    What’s Happening With PCI DSS Version 4 for E-Commerce?

    The Payment Card Industry Data Security Standard (PCI DSS) has seen some changes over the last 12 months, not least the adoption of a new version of the standard, version 4.0. This is the set of controls that must be observed when assessing a payment environment for suitable levels of security and management, as the…

  • 3B Data Security Are a CIR L2 Provider! 

    3B Data Security Are a CIR L2 Provider! 

    We’re excited to announce that 3B Data Security are a Cyber Incident Response Level 2 NCSC Assured Service Provider! 

  • Are Your IoT Devices UK Compliant the Deadline is April 29th

    Are Your IoT Devices UK Compliant the Deadline is April 29th

    With the April 29th deadline rapidly approaching, UK manufacturers, distributors, and importers of internet-connected devices are on a tight schedule to comply with the Product Security and Telecommunications Infrastructure (PSTI) Act.

  • PCI DSS Deadline Approaching – What You Need to Know

    PCI DSS Deadline Approaching – What You Need to Know

    PCI DSS Version 3.2.1 is scheduled to retire on the 31st of March 2024, with Version 4.0 set to take its place. If your PCI compliance date falls after 1st April 2024, then you will need to complete an assessment against version 4.0 of the standard. Full adherence with the standard is expected by 31 March…

  • General Cyber Security Practices to Strengthening Your Defence

    General Cyber Security Practices to Strengthening Your Defence

    Implementing general security practices can significantly enhance your organisation’s resilience against cyber threats. We take a look at some key practices, along with their impact on security.