Charities Falling Victim To Cybercrime

IT people at charity organisations are growing concerned that their computer systems are out of date and less secure than they need to be. One of the US best-known charities says it was the victim of a cyber scam last year that cost the company $1 million.

Save the Children Federation, which conducts charity operations in countries across the world, told the Boston Globe that hackers gained entry into an employee's email account. 

The hackers then used fake invoices and other means to fraudulently direct about $1 million to a fraudulent entity based in Japan. By the time the attack was discovered, it was reportedly too late to stop the money transfer, disguised as payments for solar panels to be installed on health centers in Pakistan.

The organisation reported that in the months following the attack, Save the Children managed to recoup all but $112,000 of the losses through insurance claims, and has since adopted practices to guard against such scams and hacking attempts.

“We have improved our security measures to help ensure this does not happen again,” the group's said CFO Stacy Brandom. “Fortunately, through insurance, we were ultimately reimbursed for most of the funds.”

A separate hacking attack resulted in the charity mistakenly sending $9,210 to hackers after one of the charity's vendors was the victim of a cyberattack. That money was also recouped via insurance claims. 

Cyberattacks have become commonplace in the US, with a Gallup poll released this week finding that one in four Americans have been affected by a cyber-attack in some way. Americans are now nearly 10 percentage points more likely to be affected by cybercrime than by physical theft of property, according to Gallup.

The Hill:     Boston Globe:       Image: Nick Youngson

You Might Also Read:

A Guide To Preventing Charity Cybercrime:

 

 

 

« Microsoft In A Fight To Stop Cyber War
Startups Can Differentiate By Doing Cybersecurity Right From Day One »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Sonatype

Sonatype

Sonatype protects the world's enterprise software from security, compliance, licensing risks, while reducing application development and deployment time.

Puppet

Puppet

Puppet is a leader in IT automation. Our software helps DevOps securely automate configuration and management of machines and the software running on them.

PortSwigger

PortSwigger

PortSwigger's Burp Suite is an integrated platform for performing security testing of web applications.

Green Hills Software

Green Hills Software

Green Hills Software is the largest independent vendor of embedded secure software solutions for applications including the Internet of Things.

Opscura

Opscura

Opscura (formerly Enigmedia) brings the reliable and cautious hands of operations together with the analytical minds of cyber experts and cryptography researchers.

Granite Partners

Granite Partners

Granite is a cloud service for the development of business risk management, cyber security and privacy and occupational safety and health.

Sponge

Sponge

Sponge is a world-renowned digital learning provider on a mission to make learning unforgettable.

ChainSecurity

ChainSecurity

ChainSecurity provides products and services for securing smart contracts and blockchain protocols and conducts R&D in the areas of security, program analysis, and machine learning.

OffSec

OffSec

OffSec have defined the standard of excellence in penetration testing training. Elite security instructors teach our intense training scenarios and exceptional course material.

Wickr

Wickr

Wickr's mission is to secure the world's most critical communications. Wickr provides the highest standard of encryption trusted by millions worldwide.

Financial Services Information Sharing and Analysis Center (FS-ISAC)

Financial Services Information Sharing and Analysis Center (FS-ISAC)

The Financial Services Information Sharing and Analysis Center is the only global cyber intelligence sharing community solely focused on financial services.

Eureka Security

Eureka Security

Eureka help organizations securely use any cloud data storage technology they need without having to compromise on security.

Tenet3

Tenet3

Tenet3's vision is to make optimal cyber strategy development tractable, data driven, with concrete success metrics. The result is cost effective cyber resilience for our customers.

TokenEx

TokenEx

TokenEx Cloud Security Platform protects sensitive data to strengthen our clients' security postures while future-proofing their operations.

Creative ITC

Creative ITC

Creative ITC is a leading infrastructure and cloud enablement company. We design and deliver exceptional managed services and cloud solutions.

Start-Up Chile (SUP)

Start-Up Chile (SUP)

Start-Up Chile is a business accelerator program created by the Chilean Government for high-potential tech entrepreneurs.