Charities Falling Victim To Cybercrime

IT people at charity organisations are growing concerned that their computer systems are out of date and less secure than they need to be. One of the US best-known charities says it was the victim of a cyber scam last year that cost the company $1 million.

Save the Children Federation, which conducts charity operations in countries across the world, told the Boston Globe that hackers gained entry into an employee's email account. 

The hackers then used fake invoices and other means to fraudulently direct about $1 million to a fraudulent entity based in Japan. By the time the attack was discovered, it was reportedly too late to stop the money transfer, disguised as payments for solar panels to be installed on health centers in Pakistan.

The organisation reported that in the months following the attack, Save the Children managed to recoup all but $112,000 of the losses through insurance claims, and has since adopted practices to guard against such scams and hacking attempts.

“We have improved our security measures to help ensure this does not happen again,” the group's said CFO Stacy Brandom. “Fortunately, through insurance, we were ultimately reimbursed for most of the funds.”

A separate hacking attack resulted in the charity mistakenly sending $9,210 to hackers after one of the charity's vendors was the victim of a cyberattack. That money was also recouped via insurance claims. 

Cyberattacks have become commonplace in the US, with a Gallup poll released this week finding that one in four Americans have been affected by a cyber-attack in some way. Americans are now nearly 10 percentage points more likely to be affected by cybercrime than by physical theft of property, according to Gallup.

The Hill:     Boston Globe:       Image: Nick Youngson

You Might Also Read:

A Guide To Preventing Charity Cybercrime:

 

 

 

« Microsoft In A Fight To Stop Cyber War
Startups Can Differentiate By Doing Cybersecurity Right From Day One »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Imperva

Imperva

Imperva is a leading provider of data and application security solutions including DDoS protection, Web application security, Data security and Cloud security.

Sentia

Sentia

Sentia is an IT and infrastructure firm, with focus on Outsourcing, IT operation and management, Hosting, Co-location, Network, and IT security.

TEISS

TEISS

Teiss.co.uk is a website dedicated to providing information about cyber security. TEISS also provide a series of conferences and events focused on cyber security.

Gita Technologies

Gita Technologies

Gita Technologies works to create integrated solutions to the thorniest problems in the field of intelligence and cyber today.

Ashley Page

Ashley Page

Ashley Page offer a unique cyber insurance and risk management solution - Cyber+Insure.

TechRate

TechRate

Techrate is an analytics agency focused on blockchain technology and engineering. Or expertise includes security and technical audits of projects.

Knovos

Knovos

Knovos is a leading technology innovator developing solutions for automating, integrating, and innovating Information Governance.

Kasm Technologies

Kasm Technologies

Kasm Browser Isolation - Protect your organization from malware, ransomware and phishing by using zero-trust containerized browsers.

Cybersecurity Maturity Model Certification Center of Excellence (CMMC COE)

Cybersecurity Maturity Model Certification Center of Excellence (CMMC COE)

CMMC COE is an IT-AAC sponsored public–private partnership that will be the focal point for entities seeking to achieve Cybersecurity Maturity Model Certification.

Intel

Intel

Intel products are engineered with built-in security technologies to help protect potential attack surfaces.

VectorRock

VectorRock

Save Your Business From Cyber Criminals. We specialize in uncovering cyber risks which threaten your organization and fixing them.

Roberts & Obradovic Law

Roberts & Obradovic Law

Roberts & Obradovic Law Group is a corporate, privacy, employment and litigation law firm.

Bulletproof Solutions

Bulletproof Solutions

Bulletproof provides IT expert support, services, and guidance to businesses small and large as they grow and adapt to today’s complex IT, cybersecurity, and compliance needs.

DHCO IT

DHCO IT

The DHCO IT team are experts in IT support, cyber security, cloud support and disaster recovery, and are Microsoft 365 partners.

Bell Canada

Bell Canada

Bell is the leading provider of network and communications services for Canadian businesses and the partner for delivering network, IoT, cloud, voice, collaboration and security solutions.

CSIRT-Gnd

CSIRT-Gnd

CSIRT-Gnd provides 24x7 Computer Security Incident Response Services to citizens, companies and government agencies in Grenada.