3B Data Security Blog

  • Data Breach: How to Discover the Extent of the Damage

    Data Breach: How to Discover the Extent of the Damage

    If you suffer from a data breach, it’s important to act quickly to contain the breach and determine the cause and extent of the damage. In this blog, we’ll guide you through the steps you need to take when it comes to investigating a data breach, and how to discover the extent of the damage.

  • Google’s .zip and .mov TLDs Enabling New Phishing Tactics

    Google’s .zip and .mov TLDs Enabling New Phishing Tactics

    In a recent announcement, Google unveiled a range of new top-level domains (TLDs), including some unexpected choices like “.zip” and “.mov.” While these additions expand the possibilities for website addresses, they also raise concerns about potential phishing and online scams

  • What is Vulnerability Scanning and How Does it Work?

    What is Vulnerability Scanning and How Does it Work?

    Vulnerability scanning is a crucial element of any robust cyber security strategy. To mitigate the risk of cyber threats, you need to be aware of weaknesses and vulnerabilities that are present in your systems and patch them before they can be exploited. So, what is vulnerability scanning and how does it work?

  • Malware – Evading Detection Through Zip Folders

    Malware – Evading Detection Through Zip Folders

    A popular method that we’ve been seeing recently on how attackers hide their malware is by packing it into an encrypted zip folder. So how can you tell if a file inside a zip folder is safe or not?

  • An Introduction to The Cyber Advisor Scheme

    An Introduction to The Cyber Advisor Scheme

    The National Cyber Security Centre (NCSC), in partnership with IASME, have recently launched a new Industry Assurance Scheme – Cyber Advisor. This scheme aims to help small and medium-sized businesses ensure they have baseline cyber security controls in place.

  • 3CX Breach Caused by Double Supply Chain Attack

    3CX Breach Caused by Double Supply Chain Attack

    Last month, multiple cyber security companies reported malicious activity of a trojanised version of the 3CX Desktop App that clients were using to make VoIP calls.

  • VA+ Training for Cyber Essentials Assessors

    VA+ Training for Cyber Essentials Assessors

    This course specifically prepares individuals for the Vulnerability Assessment Plus (VA+) examination, a certification developed in collaboration with the National Cyber Security Centre, IASME, and CyberScheme.

  • The Dangers of Phishing Scams: How to Spot and Avoid Them

    The Dangers of Phishing Scams: How to Spot and Avoid Them

    In this blog, we will explore the dangers of phishing scams in more detail, and provide tips on how to spot and avoid them.

  • The Cost of Cyber Crime – Why Prevention Is Key

    The Cost of Cyber Crime – Why Prevention Is Key

    Cyber crime is on the rise, with the global cost expected to grow from $8.44 trillion (£6.9 trillion) in 2022, to $23.84 trillion (£19.5 trillion) by 2027. As technology continues to advance, the threat of cyber attacks is only going to become more prevalent.

  • Microsoft 365 – What Are the Security Risks?

    Microsoft 365 – What Are the Security Risks?

    The Microsoft 365 Suite is currently used by 345 million people across the globe. So, what are some of the most common security risks associated with Microsoft 365?