Charities Falling Victim To Cybercrime

IT people at charity organisations are growing concerned that their computer systems are out of date and less secure than they need to be. One of the US best-known charities says it was the victim of a cyber scam last year that cost the company $1 million.

Save the Children Federation, which conducts charity operations in countries across the world, told the Boston Globe that hackers gained entry into an employee's email account. 

The hackers then used fake invoices and other means to fraudulently direct about $1 million to a fraudulent entity based in Japan. By the time the attack was discovered, it was reportedly too late to stop the money transfer, disguised as payments for solar panels to be installed on health centers in Pakistan.

The organisation reported that in the months following the attack, Save the Children managed to recoup all but $112,000 of the losses through insurance claims, and has since adopted practices to guard against such scams and hacking attempts.

“We have improved our security measures to help ensure this does not happen again,” the group's said CFO Stacy Brandom. “Fortunately, through insurance, we were ultimately reimbursed for most of the funds.”

A separate hacking attack resulted in the charity mistakenly sending $9,210 to hackers after one of the charity's vendors was the victim of a cyberattack. That money was also recouped via insurance claims. 

Cyberattacks have become commonplace in the US, with a Gallup poll released this week finding that one in four Americans have been affected by a cyber-attack in some way. Americans are now nearly 10 percentage points more likely to be affected by cybercrime than by physical theft of property, according to Gallup.

The Hill:     Boston Globe:       Image: Nick Youngson

You Might Also Read:

A Guide To Preventing Charity Cybercrime:

 

 

 

« Microsoft In A Fight To Stop Cyber War
Startups Can Differentiate By Doing Cybersecurity Right From Day One »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

RISA

RISA

RISA solutions help to secure networks, improve overall network security, and achieve government regulatory compliance.

CircleCI

CircleCI

CircleCI’s platform allows developers to rapidly release code (for web and mobile apps) they trust by automating the build, test, and deploy process.

Information Security Research Association (ISRA)

Information Security Research Association (ISRA)

ISRA is a non-profit organization focused on various aspects of Information Security including security research and cyber security awareness activities.

Deep Identity

Deep Identity

Deep Identity is a boutique system integrator, with expertise in tailored identity governance & administration (IGA) and identity access management (IAM) solutions.

Maryman & Associates

Maryman & Associates

Maryman & Associates are specialists in computer forensic investigations, incident response and e-discovery services.

mnemonic

mnemonic

mnemonic helps businesses manage their security risks, protect their data and defend against cyber threats.

NowSecure

NowSecure

NowSecure are the experts in mobile app security testing software and services.

Cybersecurity Competence Center (C3)

Cybersecurity Competence Center (C3)

The Cybersecurity Competence Center was created to further strengthen the Luxembourg economy in the field of cybersecurity.

CyberSecurityTrainingCourses.com

CyberSecurityTrainingCourses.com

Cyber Security Training Courses is a portal to help candidates find the best courses to progress their career within the IT security industry.

Cyber Security Cloud (CSC)

Cyber Security Cloud (CSC)

Cyber Security Cloud provides web application security services worldwide using world's leading cyber threat intelligence and AI technology.

Take Five

Take Five

Take Five is a national campaign offering straight-forward, impartial advice that helps prevent email, phone-based and online fraud – particularly where criminals impersonate trusted organisations.

ConnectWise

ConnectWise

The Unified ConnectWise Platform offers intelligent software and expert services to easily run your business, deliver your services, secure your clients, and build your staff.

SubRosa Cyber Solutions

SubRosa Cyber Solutions

SubRosa Cyber Solutions solves its clients’ most tenacious information security, risk and compliance challenges through a multitude of information technology services and expertise.

FREE eBook: Practical Guide To Optimizing Your Cloud Deployments

FREE eBook: Practical Guide To Optimizing Your Cloud Deployments

AWS Marketplace eBook: Optimizing your cloud deployments to accelerate cloud activities, reduce costs, and improve customer experience.

Cynalytica

Cynalytica

Cynalytica deliver pioneering cybersecurity and machine analytics technologies that help protect critical infrastructure, securely enable Industry 4.0 and help accelerate digital transformation.

Certo Software

Certo Software

Certo are trusted experts in mobile security. At Certo, mobile security is not an afterthought, it’s what we do.