A Guide To Preventing Charity Cybercrime

The Charity Cyber Guide  produced by Ecclesiastical Insurance provides organisations with information on the range of cyber threats they could face, from ransomware, malware and denial of service to phishing, password attacks and human error.

It also offers practical advice on mitigating such risks, including guidance on protection against data breaches.

The new guide has been put together after research by the insurer that found 17 per cent of charities had experienced cyber-attacks, with ransomware top of the list. Sixty-three per cent expressed concern about cyber and Internet crime.

Ecclesiastical’s charity director, David Britton, said: "After several years of high-profile attacks on larger corporations and businesses, there is now a growing trend of cyber attackers turning their attention towards organisations that might have a lower level of cyber security, including charities.

"It’s clear from our research that even the threat of an attack is acting as a barrier to some charities innovating, and there’s a growing recognition that the long-term reputational damage to the charity and its trustees can be just as serious as the initial loss of data and the costs of putting things right."

The Big Issue Foundation has worked with the cashless donations provider Thyngs to add three-tap mobile donation technology to its website, fundraising appeals, direct marketing campaigns and collecting tins.

Big Issue supporters will be able to donate by scanning the foundation’s unique QR code, choosing an amount and donating using Apple Pay, Google Pay or card, adding Gift Aid without having to enter any contact details. 
It aims to incorporate the technology into an appeal and include it on collecting buckets and tins at its Sleep Outs in the autumn and The Big Night Walk in 2019.

Emma Cheung, head of individual giving and donor support at The Big Issue Foundation, said that in an increasingly cashless society the technology "allows us to provide the quick and painless experience that our donors want, using the technology they already have in their pockets".

Cardiff is considering using contactless donation points in the city again after a trial raised more than £3,000 for homelessness.

The scheme, which was run by Give DIFFerently and funded through FOR Cardiff, featured an interactive screen installed on The Hayes, one of the city's busiest shopping streets. 

Adrian Field, executive director of FOR Cardiff, the city’s business improvement district, said: "We are delighted to see that the trial of this type of giving has been so well received in Cardiff. It is imperative to us that we invest in the longevity of the campaign. We are looking to work with local businesses to facilitate other contactless pay points and methods of alternative giving around the city."

Third Sector:

You Might Also Read:

Action Fraud: Social Media Used to Steal Charity Donations:

Cyberattacks Focus On Big UK Charities:

 

« The Pitfalls Of GDPR & Cyber Security For Micro Organisations
What Your Board Needs To Know About GDPR »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Navista

Navista

Navista's hardware and software modules are especially designed to ease the deployment of secure networks.

TestingXperts

TestingXperts

TestingXperts is a specialist software QA and testing company.

Fraunhofer Institute for Secure Information Technology (SIT)

Fraunhofer Institute for Secure Information Technology (SIT)

Fraunhofer SIT is a research centre specialising in all areas of IT security.

Teramind

Teramind

Teramind provides a user-centric security approach to monitor employee behavior in order to identify suspicious activity, detect possible threats, monitor efficiency, and ensure industry compliance.

Tugboat Logic

Tugboat Logic

Tugboat Logic was created to address the skills and expertise gap in the security and compliance industry. Our goal is to simplify and automate information security management for every enterprise.

TopSOC Information Security

TopSOC Information Security

TopSOC Information Security provide a wide range of security consultation, implementation and training services.

Venustech

Venustech

Venustech is a leading provider of network security products, trusted security management platforms, specialized security services and solutions.

AdvIntel

AdvIntel

AdvIntel is a next-generation threat prevention and loss prevention company launched by a team of certified investigators, reverse engineers, and security experts.

Protectt.ai Labs

Protectt.ai Labs

Protectt.ai Labs is India’s first mobile security start up building awareness & providing solutions for mobile app, device & transaction security.

8com

8com

8com is an established Managed Security Service Provider (MSSP) with over 75 employees and customers in over 40 countries.

NANO Corp

NANO Corp

At NANO Corp, we keep your network visible, understandable, operational and secure with state-of-the-art technology.

ScamAdvisor

ScamAdvisor

ScamAdviser helps over 3 million consumers every month to discover if a website is legitimate or a possible scam.

Barrier Networks

Barrier Networks

Barrier Networks are a Cyber Security Managed Service Provider that specialises in Network and Application security.

Security Solutions Services (S-3)

Security Solutions Services (S-3)

S-3 specialize in crafting tailored network design, security hardware, software, and storage solutions for businesses of all sizes.

Netia

Netia

Netia is a Polish telecommunications company providing a range of business services including network solutions, communications, data centre and cloud, and cybersecurity.

SecureFlag

SecureFlag

SecureFlag is dedicated to enhancing secure coding across all technical profiles within the Software Development Lifecycle.