A Guide To Preventing Charity Cybercrime

The Charity Cyber Guide  produced by Ecclesiastical Insurance provides organisations with information on the range of cyber threats they could face, from ransomware, malware and denial of service to phishing, password attacks and human error.

It also offers practical advice on mitigating such risks, including guidance on protection against data breaches.

The new guide has been put together after research by the insurer that found 17 per cent of charities had experienced cyber-attacks, with ransomware top of the list. Sixty-three per cent expressed concern about cyber and Internet crime.

Ecclesiastical’s charity director, David Britton, said: "After several years of high-profile attacks on larger corporations and businesses, there is now a growing trend of cyber attackers turning their attention towards organisations that might have a lower level of cyber security, including charities.

"It’s clear from our research that even the threat of an attack is acting as a barrier to some charities innovating, and there’s a growing recognition that the long-term reputational damage to the charity and its trustees can be just as serious as the initial loss of data and the costs of putting things right."

The Big Issue Foundation has worked with the cashless donations provider Thyngs to add three-tap mobile donation technology to its website, fundraising appeals, direct marketing campaigns and collecting tins.

Big Issue supporters will be able to donate by scanning the foundation’s unique QR code, choosing an amount and donating using Apple Pay, Google Pay or card, adding Gift Aid without having to enter any contact details. 
It aims to incorporate the technology into an appeal and include it on collecting buckets and tins at its Sleep Outs in the autumn and The Big Night Walk in 2019.

Emma Cheung, head of individual giving and donor support at The Big Issue Foundation, said that in an increasingly cashless society the technology "allows us to provide the quick and painless experience that our donors want, using the technology they already have in their pockets".

Cardiff is considering using contactless donation points in the city again after a trial raised more than £3,000 for homelessness.

The scheme, which was run by Give DIFFerently and funded through FOR Cardiff, featured an interactive screen installed on The Hayes, one of the city's busiest shopping streets. 

Adrian Field, executive director of FOR Cardiff, the city’s business improvement district, said: "We are delighted to see that the trial of this type of giving has been so well received in Cardiff. It is imperative to us that we invest in the longevity of the campaign. We are looking to work with local businesses to facilitate other contactless pay points and methods of alternative giving around the city."

Third Sector:

You Might Also Read:

Action Fraud: Social Media Used to Steal Charity Donations:

Cyberattacks Focus On Big UK Charities:

 

« The Pitfalls Of GDPR & Cyber Security For Micro Organisations
What Your Board Needs To Know About GDPR »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Paessler

Paessler

Paessler is a leading worldwide provider of network monitoring software.

Telos

Telos

Telos offers cybersecurity solutions and services that empower and protect the world’s most security-conscious enterprises.

Cyber Together

Cyber Together

Cyber Together is dedicated to advancing the cyber security industry by giving businesses access to Israel’s leaders, innovators and great minds in the field of cyber security.

Cyber adAPT

Cyber adAPT

Cyber adAPT offers a leading network threat detection platform (NTD) to the enterprise and ODM/OEM markets.

Qubitekk

Qubitekk

Qubitekk has developed quantum cryptography solutions for the machine-to-machine (M2M) communications market.

Dathena

Dathena

Dathena is a company developing data governance software based on machine learning algorithms.

ISMS.online

ISMS.online

ISMS.online is a cloud software solution for fast & cost-effective implementation of an information security management system and achieve compliance with ISO 27001 and other standards.

Fortiphyd Logic

Fortiphyd Logic

Fortiphyd Logic equips operators of the power grid, oil & gas, and other critical infrastructure with the tools and training they need to defend their industrial networks from advanced cyberattacks.

Russell Reynolds Associates

Russell Reynolds Associates

Russell Reynolds Associates is a global leadership advisory and search firm with functional expertise in Digital Leadership, Data & Analytics, and Compliance.

Pentest Limited

Pentest Limited

Pentest Limited provide information security consultation, penetration testing & red teaming services to companies across the globe.

NWN Corp

NWN Corp

NWN Corporation is a leading Cloud Communications Service Provider (CCSP) focused on transforming the customer and workspace experience for commercial, enterprise and public sector organizations.

SAM Seamless Network

SAM Seamless Network

SAM Seamless Network is a cybersecurity technology platform that protects the connected home, by tackling cyber security threats at the source.

Syracom

Syracom

syracom is a consultancy firm specialized in development of efficient business processes. With our expertise and IT competence, we develop tailored solutions for customers in various industries.

SequelNet

SequelNet

SequelNet is an emerging MSP, providing 360° business IT solutions and consulting services.

Allstate Identity Protection

Allstate Identity Protection

Allstate make it easy to provide complete identity protection, so everyone can live more confidently online.

Frontier Technology Inc. (FTI)

Frontier Technology Inc. (FTI)

Frontier Technology Inc provides the technology and deep data expertise to drive the best defense and intelligence solutions.