Cyber attacks – what charities need to do

Charities should be aware of “WannaCry” and “Petya”. These are the cyber attacks that have brought organisations to a standstill recently. Many charities are not investing in adequate levels of cyber protection. The Charity Commission has warned that charities could be at risk and should be vigilant. Further Matthew Hancock the digital minister has said charities “must do better” to protect sensitive information they hold as it emerged that many smaller organisations rely on external IT providers to protect their data.
Data protection legislation requires that for every charity that controls personal data, for example information about staff or donors, “appropriate technical and organisational measures must be taken against unauthorised or unlawful processing of personal data”. A cyber-attack will usually result in unauthorised or unlawful processing of personal data. So charities need to take steps to resist cyber-attacks in order to comply with the law.
Technical measures include use of appropriate antivirus software, software updates and patches.
Organisational measures include raising awareness amongst staff and keeping working practices under review. Typical areas of vulnerability are:
 Mobile and remote working. A range of measures can be taken to minimise the risk involved in working remotely. For example, charities can keep the amount of data stored on a mobile device down to the minimum necessary to carry out the required business activity.
 Passwords. With individuals now expected to maintain numerous separate passwords, requiring users to regularly change their passwords is now considered to be potentially counterproductive. Password rules are necessary, but they should be simple and easy to follow.
 Email. Training to help staff to spot increasingly sophisticated phishing and spoofing, and avoid clicking on links or attachments, can reduce the risk of malware being introduced into systems.
Being the victim of a cyber-attack can be very unfortunate. But those organisations that have not taken appropriate technical and organisational measures to guard against these attacks will still be accountable for the loss. Staff must receive adequate training to deal with online attacks.

Similar Articles

Charities using social me... The Charity Commission advises that if your charity uses social media, you are responsible for: agreeing and putting in place a social media policy so that you
Welcome to our blog stay tuned for more information.
Resources to help prevent... Charity fraud awareness week (18-22 October 2021) has just finished but sadly fraud will carry on. It is worth checking this webpage for information which may assist
Blenheim Palace granted c... Blenheim Palace has been registered with the Charity Commission  as the “Blenheim Heritage Foundation” with objects including restoring and preserving the site for the public benefit and
Charities Aid Foundation ... Charities have been helped to process over £70m of donations since the launch of CAF Donate. Figures released by CAF show that: £71.8m has now been raised
Best banks for Charities We are often asked about bank accounts for charities. Experiences of clients vary from bank to bank so we do not recommend any but you may find
Recruitment of new truste... In accordance with the Charities Act, an individual is currently prevented from acting as a charity trustee if they have an unspent conviction for an offence of
Charities in Scotland are... The Scottish Government has launched a grants scheme to help Scottish  charities boost their cyber security. Managed by the Scottish Council for Voluntary Organisations (SCVO), the scheme
Charity Commission new gu... The commission has published new guidance for charity trustees about fundraising from the public, CC20. The guidance sets out 6 key principles to help trustees comply with
Charity finances: trustee... The Charity Commission has updated its guidance on charity finances Charity finances: trustee essentials (CC25) to make sure that trustees understand their financial responsibilities when managing a

Leave a Reply

Your email address will not be published. Required fields are marked *