A Guide To Preventing Charity Cybercrime

The Charity Cyber Guide  produced by Ecclesiastical Insurance provides organisations with information on the range of cyber threats they could face, from ransomware, malware and denial of service to phishing, password attacks and human error.

It also offers practical advice on mitigating such risks, including guidance on protection against data breaches.

The new guide has been put together after research by the insurer that found 17 per cent of charities had experienced cyber-attacks, with ransomware top of the list. Sixty-three per cent expressed concern about cyber and Internet crime.

Ecclesiastical’s charity director, David Britton, said: "After several years of high-profile attacks on larger corporations and businesses, there is now a growing trend of cyber attackers turning their attention towards organisations that might have a lower level of cyber security, including charities.

"It’s clear from our research that even the threat of an attack is acting as a barrier to some charities innovating, and there’s a growing recognition that the long-term reputational damage to the charity and its trustees can be just as serious as the initial loss of data and the costs of putting things right."

The Big Issue Foundation has worked with the cashless donations provider Thyngs to add three-tap mobile donation technology to its website, fundraising appeals, direct marketing campaigns and collecting tins.

Big Issue supporters will be able to donate by scanning the foundation’s unique QR code, choosing an amount and donating using Apple Pay, Google Pay or card, adding Gift Aid without having to enter any contact details. 
It aims to incorporate the technology into an appeal and include it on collecting buckets and tins at its Sleep Outs in the autumn and The Big Night Walk in 2019.

Emma Cheung, head of individual giving and donor support at The Big Issue Foundation, said that in an increasingly cashless society the technology "allows us to provide the quick and painless experience that our donors want, using the technology they already have in their pockets".

Cardiff is considering using contactless donation points in the city again after a trial raised more than £3,000 for homelessness.

The scheme, which was run by Give DIFFerently and funded through FOR Cardiff, featured an interactive screen installed on The Hayes, one of the city's busiest shopping streets. 

Adrian Field, executive director of FOR Cardiff, the city’s business improvement district, said: "We are delighted to see that the trial of this type of giving has been so well received in Cardiff. It is imperative to us that we invest in the longevity of the campaign. We are looking to work with local businesses to facilitate other contactless pay points and methods of alternative giving around the city."

Third Sector:

You Might Also Read:

Action Fraud: Social Media Used to Steal Charity Donations:

Cyberattacks Focus On Big UK Charities:

 

« The Pitfalls Of GDPR & Cyber Security For Micro Organisations
What Your Board Needs To Know About GDPR »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

SolarWinds

SolarWinds

SolarWinds as a worldwide leader in solutions for network and IT service management, application performance, and managed services.

UL Solutions

UL Solutions

UL Solutions is a safety, security and compliance consulting and certification company. Areas covered include cyber security.

Intertek Group

Intertek Group

Intertek Group provides Assurance, Testing, Inspection and Certification services. Activities include cybersecurity testing and certification.

VietSunshine

VietSunshine

VietSunshine is a leading provider of network security infrastructure and solutions in Vietnam.

ESL Bangladesh

ESL Bangladesh

ESL is the Largest IT Infrastructure & Telecom Service Provider in Bangladesh.

ENLIGHTENi

ENLIGHTENi

ENLIGHTENi are the platform to develop next-gen talent in Technology, Risk, and Cybersecurity. Our mission is to develop next-gen talent through challenge-based learning and team collaboration.

Research Institute in Verified Trustworthy Software Systems (VeTSS)

Research Institute in Verified Trustworthy Software Systems (VeTSS)

The main purpose of VeTSS is to support program analysis, testing and verification, to achieve guarantees of software correctness, safety, and security.

Thoma Bravo

Thoma Bravo

Thoma Bravo is a leading private equity firm with a 40+ year history and a focus on investing in software and technology companies.

riskmethods

riskmethods

riskmethods helps you proactively identify, assess and mitigate supply chain risk. You need to master supply chain risk management—we can help.

Extreme Networks

Extreme Networks

Since 1996, Extreme has been pushing the boundaries of networking technology, driven by a vision of making it simpler and faster as well as more agile and secure.

Pangu Laboratory

Pangu Laboratory

Beijing Qi an Pangu Laboratory Technology Co., Ltd. was established on the basis of Pangu laboratory, a well-known cyber security team.

AArete

AArete

AArete is a global management and technology consulting firm specializing in strategic profitability improvement, digital transformation, and advisory services.

D.med Software

D.med Software

D.med Software is a company with a focus on cybersecurity for embedded software and cloud applications for the medical industry.

Seal Security

Seal Security

Seal Security revolutionizes software supply chain security operations, empowering organizations to automate and scale their open source vulnerability remediation and patch management.

IT Voice

IT Voice

IT Voice specializes in Managed IT and VoIP solutions. Our focus is simplifying the technology so our customers can stay focused on what they do best.

Compugen Systems Inc (CSI)

Compugen Systems Inc (CSI)

Compugen Systems is an IT service delivery company that focuses on enabling your business outcomes.