NCSC: Cyber crime is a major threat to UK charities

The organisation has created a guidance document to help charities protect themselves against threats

The NCSC has released a report, highlighting the sizeable threat of cyber crime on UK charities, encouraging them to take action against criminals and protect themselves from attacks.

As a result of its research, the organisation has released a guide that offers advice for charities to protect themselves against cybercrime. The advisory suggested that charity staff may be more likely to fall victim to attack because they're generally more trusting, and could be "socially engineered into clicking on 'dodgy' links" in emails. 

Despite the general misconceptions that charities are immune from cyber crime because they support good causes, they're just as likely to be hacked as regular businesses because they hold information of interest to criminals, such as contributor payment details and other confidential data.

Charities also deal with large sums of money and if theft occurs, however big or small, it could put the charity's reputation at risk, potentially discouraging funders from donating more money.

Other sensitive information, such as the details of beneficiaries could be life-threatening. For example, the ex-partner of a domestic violence victim may try and access a system to find their address to track them down, according to the advisory. 

The NCSC's guidance document covers five areas that charities should focus on when rolling out a security strategy, helping them combat cyber crime and protect their assets. They include backing up data regularly, ensuring passwords are as strong as possible, how to protect against malware, prevent falling victim to phishing attacks and keeping devices safe.

The advice has been designed for small charities that are unlikely to have the security resource to implement a large-scale security policy, but is simple to follow, meaning organisations won't have to hire new staff, which can be time-consuming and costly.

Image: Shutterstock

Featured Resources

BIOS security: The next frontier for endpoint protection

Today’s threats upend traditional security measures

Download now

The role of modern storage in a multi-cloud future

Research exploring the impact of modern storage in defining cloud success

Download now

Enterprise data protection: A four-step plan

An interactive buyers’ guide and checklist

Download now

The total economic impact of Adobe Sign

Cost savings and business benefits enabled by Adobe Sign

Download now

Most Popular

16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

16 Sep 2020
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

16 Sep 2020
Google removes 17 apps infected with evasive ‘Joker’ malware
malware

Google removes 17 apps infected with evasive ‘Joker’ malware

28 Sep 2020