A Guide To Preventing Charity Cybercrime

The Charity Cyber Guide  produced by Ecclesiastical Insurance provides organisations with information on the range of cyber threats they could face, from ransomware, malware and denial of service to phishing, password attacks and human error.

It also offers practical advice on mitigating such risks, including guidance on protection against data breaches.

The new guide has been put together after research by the insurer that found 17 per cent of charities had experienced cyber-attacks, with ransomware top of the list. Sixty-three per cent expressed concern about cyber and Internet crime.

Ecclesiastical’s charity director, David Britton, said: "After several years of high-profile attacks on larger corporations and businesses, there is now a growing trend of cyber attackers turning their attention towards organisations that might have a lower level of cyber security, including charities.

"It’s clear from our research that even the threat of an attack is acting as a barrier to some charities innovating, and there’s a growing recognition that the long-term reputational damage to the charity and its trustees can be just as serious as the initial loss of data and the costs of putting things right."

The Big Issue Foundation has worked with the cashless donations provider Thyngs to add three-tap mobile donation technology to its website, fundraising appeals, direct marketing campaigns and collecting tins.

Big Issue supporters will be able to donate by scanning the foundation’s unique QR code, choosing an amount and donating using Apple Pay, Google Pay or card, adding Gift Aid without having to enter any contact details. 
It aims to incorporate the technology into an appeal and include it on collecting buckets and tins at its Sleep Outs in the autumn and The Big Night Walk in 2019.

Emma Cheung, head of individual giving and donor support at The Big Issue Foundation, said that in an increasingly cashless society the technology "allows us to provide the quick and painless experience that our donors want, using the technology they already have in their pockets".

Cardiff is considering using contactless donation points in the city again after a trial raised more than £3,000 for homelessness.

The scheme, which was run by Give DIFFerently and funded through FOR Cardiff, featured an interactive screen installed on The Hayes, one of the city's busiest shopping streets. 

Adrian Field, executive director of FOR Cardiff, the city’s business improvement district, said: "We are delighted to see that the trial of this type of giving has been so well received in Cardiff. It is imperative to us that we invest in the longevity of the campaign. We are looking to work with local businesses to facilitate other contactless pay points and methods of alternative giving around the city."

Third Sector:

You Might Also Read:

Action Fraud: Social Media Used to Steal Charity Donations:

Cyberattacks Focus On Big UK Charities:

 

« The Pitfalls Of GDPR & Cyber Security For Micro Organisations
What Your Board Needs To Know About GDPR »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Northbridge Insurance

Northbridge Insurance

Northbridge is a leading Canadian business insurance provider. Services offered include Cyber Risk insurance.

Bolton Labs

Bolton Labs

Bolton Labs is a leading provider cybersecurity services, tools, and analysis for MSPs and organizations who want to scale their security offerings.

StackRox

StackRox

StackRox delivers a container-native security platform that adapts detection and response to new threats.

Fortanix

Fortanix

Fortanix Runtime Encryption keeps keys, data, and applications completely protected from external and internal threats.

Netlawgic Legal Services

Netlawgic Legal Services

Netlawgic is exclusively focused on delivering cyber law solutions to the industry. We provide our clients with specialized attention and problem solving in all aspects of cyber law.

Crown Sterling

Crown Sterling

Crown Sterling delivers next generation software-based, AI-driven cryptography in the form of random number generators and encryption products.

WebSec B.V.

WebSec B.V.

WebSec is a Dutch Cybersecurity firm mainly focused on offensive security services such as pentesting, red teaming and security awareness and phishing campaigns.

ConnectWise

ConnectWise

The Unified ConnectWise Platform offers intelligent software and expert services to easily run your business, deliver your services, secure your clients, and build your staff.

Microland

Microland

Microland’s delivery of digital is all about making technology do more and intrude less for global enterprises. Our services include Cloud & Data Center, Networks, Cybersecurity and more.

Bloc Ventures

Bloc Ventures

Bloc Ventures is an investment company providing long-term, ‘patient’ equity capital to early stage unquoted deep technology companies.

Kocho

Kocho

Kocho (formerly TiG) is a provider of identity and access, cyber security, cloud transformation, and managed IT services.

Pires Investments

Pires Investments

Pires is building an investment portfolio of high-tech businesses across areas such as Artificial Intelligence, Internet of Things, Cyber Security and Augmented/Virtual Reality.

Scholarly Networks Security Initiative (SNSI)

Scholarly Networks Security Initiative (SNSI)

SNSI brings together publishers and institutions to solve cyber-challenges threatening the integrity of the scientific record, scholarly systems and the safety of personal data.

Training.com.au

Training.com.au

Training.com.au is a comparison website through which those looking to learn about different aspects of cyber security can compare learning courses from training providers from across Australia.

Conceal

Conceal

Conceal’s mission is to stop ransomware and credential theft for companies of all sizes by developing innovative solutions that provide social engineering protection in any browser.

Hive

Hive

Hive is a leading provider of cloud-based AI solutions to understand, search, and generate content, and is trusted by hundreds of the world's largest and most innovative organizations.