NCSC: Cyber crime is a major threat to UK charities

The organisation has created a guidance document to help charities protect themselves against threats

The NCSC has released a report, highlighting the sizeable threat of cyber crime on UK charities, encouraging them to take action against criminals and protect themselves from attacks.

As a result of its research, the organisation has released a guide that offers advice for charities to protect themselves against cybercrime. The advisory suggested that charity staff may be more likely to fall victim to attack because they're generally more trusting, and could be "socially engineered into clicking on 'dodgy' links" in emails. 

Despite the general misconceptions that charities are immune from cyber crime because they support good causes, they're just as likely to be hacked as regular businesses because they hold information of interest to criminals, such as contributor payment details and other confidential data.

Charities also deal with large sums of money and if theft occurs, however big or small, it could put the charity's reputation at risk, potentially discouraging funders from donating more money.

Other sensitive information, such as the details of beneficiaries could be life-threatening. For example, the ex-partner of a domestic violence victim may try and access a system to find their address to track them down, according to the advisory. 

The NCSC's guidance document covers five areas that charities should focus on when rolling out a security strategy, helping them combat cyber crime and protect their assets. They include backing up data regularly, ensuring passwords are as strong as possible, how to protect against malware, prevent falling victim to phishing attacks and keeping devices safe.

The advice has been designed for small charities that are unlikely to have the security resource to implement a large-scale security policy, but is simple to follow, meaning organisations won't have to hire new staff, which can be time-consuming and costly.

Image: Shutterstock

Featured Resources

Unleashing the power of AI initiatives with the right infrastructure

What key infrastructure requirements are needed to implement AI effectively?

Download now

Achieve today. Plan tomorrow. Making the hybrid multi-cloud journey

A Veritas webinar on implementing a hybrid multi-cloud strategy

Download now

A buyer’s guide for cloud-based phone solutions

Finding the right phone system for your modern business

Download now

The workers' experience report

How technology can spark motivation, enhance productivity and strengthen security

Download now

Most Popular

How to move Windows 10 from your old hard drive to SSD
operating systems

How to move Windows 10 from your old hard drive to SSD

21 Jan 2021
Hackers are actively exploiting three Apple iOS flaws
exploits

Hackers are actively exploiting three Apple iOS flaws

27 Jan 2021
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

26 Jan 2021