A Guide To Preventing Charity Cybercrime

The Charity Cyber Guide  produced by Ecclesiastical Insurance provides organisations with information on the range of cyber threats they could face, from ransomware, malware and denial of service to phishing, password attacks and human error.

It also offers practical advice on mitigating such risks, including guidance on protection against data breaches.

The new guide has been put together after research by the insurer that found 17 per cent of charities had experienced cyber-attacks, with ransomware top of the list. Sixty-three per cent expressed concern about cyber and Internet crime.

Ecclesiastical’s charity director, David Britton, said: "After several years of high-profile attacks on larger corporations and businesses, there is now a growing trend of cyber attackers turning their attention towards organisations that might have a lower level of cyber security, including charities.

"It’s clear from our research that even the threat of an attack is acting as a barrier to some charities innovating, and there’s a growing recognition that the long-term reputational damage to the charity and its trustees can be just as serious as the initial loss of data and the costs of putting things right."

The Big Issue Foundation has worked with the cashless donations provider Thyngs to add three-tap mobile donation technology to its website, fundraising appeals, direct marketing campaigns and collecting tins.

Big Issue supporters will be able to donate by scanning the foundation’s unique QR code, choosing an amount and donating using Apple Pay, Google Pay or card, adding Gift Aid without having to enter any contact details. 
It aims to incorporate the technology into an appeal and include it on collecting buckets and tins at its Sleep Outs in the autumn and The Big Night Walk in 2019.

Emma Cheung, head of individual giving and donor support at The Big Issue Foundation, said that in an increasingly cashless society the technology "allows us to provide the quick and painless experience that our donors want, using the technology they already have in their pockets".

Cardiff is considering using contactless donation points in the city again after a trial raised more than £3,000 for homelessness.

The scheme, which was run by Give DIFFerently and funded through FOR Cardiff, featured an interactive screen installed on The Hayes, one of the city's busiest shopping streets. 

Adrian Field, executive director of FOR Cardiff, the city’s business improvement district, said: "We are delighted to see that the trial of this type of giving has been so well received in Cardiff. It is imperative to us that we invest in the longevity of the campaign. We are looking to work with local businesses to facilitate other contactless pay points and methods of alternative giving around the city."

Third Sector:

You Might Also Read:

Action Fraud: Social Media Used to Steal Charity Donations:

Cyberattacks Focus On Big UK Charities:

 

« The Pitfalls Of GDPR & Cyber Security For Micro Organisations
What Your Board Needs To Know About GDPR »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Brookings Institution

Brookings Institution

The Brookings Institution is a nonprofit public policy organization. Cyber security is covered within the various study areas.

BlueID

BlueID

BlueID is an IDaaS technology product which enables your objects to securely connect and interact with your users’ smart phones and smart watches.

CybergymIEC

CybergymIEC

CybergymIEC is a global leader in cyber defense solutions and training services.

Array Networks

Array Networks

Array Networks, the network functions platform company, develops purpose-built systems for hosting virtual networking and security functions with guaranteed performance.

Cyscale

Cyscale

Cyscale is a consultancy and development agency helping Enterprises adopt and migrate to the Cloud by providing an Automated Cloud Security Platform.

PSYND

PSYND

PSYND is a Swiss consultancy company based in Geneva specialized in CyberSecurity and Identity & Access Management.

Kratikal

Kratikal

Kratikal provides a complete suite of manual and automated security testing services.

Lumu Technologies

Lumu Technologies

Lumu is a cybersecurity company that illuminates threats and attacks affecting enterprises worldwide.

Loki Labs

Loki Labs

Loki Labs provides expert cyber security solutions and services, including vulnerability assessments & penetration testing, emergency incident response, and managed security.

Silicon Cloud International

Silicon Cloud International

Silicon Cloud is a high performance and secure cloud computing platform for engineering and scientific applications.

Stefanini Group

Stefanini Group

Stefanini is a global IT services company providing a broad range of solutions for digital transformation including automation, cloud, IoT and cybersecurity.

A&O IT Group

A&O IT Group

A&O IT Group provide IT support and services including IT Managed Services, IT Project Services, IT Engineer Services and Cyber Security.

BlockAPT

BlockAPT

BlockAPT, empowering you with an advanced, intelligent cyber defence platform. We protect our customers digital assets by unifying operational technologies against advanced persistent threats.

BIG Cyber

BIG Cyber

BIG Cyber is a specialized Managed Security Service Provider (MSSP) dedicated to bringing military grade cyber security technology to the gaming industry.

Symbol Security

Symbol Security

Through situational learning, simulations, and a gamified user experience, Symbol strengthens the cyber awareness of employees and helps companies lower cyber risk.

ASRC Federal

ASRC Federal

ASRC Federal’s mission is to help federal civilian, intelligence and defense agencies achieve successful outcomes and elevate their mission performance.