3B Data Security Blog
-
Data Breach: How to Discover the Extent of the Damage
If you suffer from a data breach, it’s important to act quickly to contain the breach and determine the cause and extent of the damage. In this blog, we’ll guide you through the steps you need to take when it comes to investigating a data breach, and how to discover the extent of the damage.
-
Google’s .zip and .mov TLDs Enabling New Phishing Tactics
In a recent announcement, Google unveiled a range of new top-level domains (TLDs), including some unexpected choices like “.zip” and “.mov.” While these additions expand the possibilities for website addresses, they also raise concerns about potential phishing and online scams
-
What is Vulnerability Scanning and How Does it Work?
Vulnerability scanning is a crucial element of any robust cyber security strategy. To mitigate the risk of cyber threats, you need to be aware of weaknesses and vulnerabilities that are present in your systems and patch them before they can be exploited. So, what is vulnerability scanning and how does it work?
-
Malware – Evading Detection Through Zip Folders
A popular method that we’ve been seeing recently on how attackers hide their malware is by packing it into an encrypted zip folder. So how can you tell if a file inside a zip folder is safe or not?
-
An Introduction to The Cyber Advisor Scheme
The National Cyber Security Centre (NCSC), in partnership with IASME, have recently launched a new Industry Assurance Scheme – Cyber Advisor. This scheme aims to help small and medium-sized businesses ensure they have baseline cyber security controls in place.
-
3CX Breach Caused by Double Supply Chain Attack
Last month, multiple cyber security companies reported malicious activity of a trojanised version of the 3CX Desktop App that clients were using to make VoIP calls.
-
VA+ Training for Cyber Essentials Assessors
This course specifically prepares individuals for the Vulnerability Assessment Plus (VA+) examination, a certification developed in collaboration with the National Cyber Security Centre, IASME, and CyberScheme.
-
The Dangers of Phishing Scams: How to Spot and Avoid Them
In this blog, we will explore the dangers of phishing scams in more detail, and provide tips on how to spot and avoid them.
-
The Cost of Cyber Crime – Why Prevention Is Key
Cyber crime is on the rise, with the global cost expected to grow from $8.44 trillion (£6.9 trillion) in 2022, to $23.84 trillion (£19.5 trillion) by 2027. As technology continues to advance, the threat of cyber attacks is only going to become more prevalent.
-
Microsoft 365 – What Are the Security Risks?
The Microsoft 365 Suite is currently used by 345 million people across the globe. So, what are some of the most common security risks associated with Microsoft 365?
- Top Cyber Threats to Look Out for This Black Friday
- What Is a Credential Stuffing Attack and How Does It Work?
- Different Types of Penetration Testing and How To Choose the Right One for Your Business
- UBDS Group acquires 3B Data Security in its mission to become cyber security powerhouse
- From Tabletop to Real-World Testing: The Value of Cyber Incident Exercises