{"id":2158,"date":"2019-11-12T11:16:15","date_gmt":"2019-11-12T11:16:15","guid":{"rendered":"https:\/\/www.networkportfolio.co.uk\/ncinsurance.co.uk\/thirdsectorprotect\/?p=2158"},"modified":"2020-01-10T09:28:55","modified_gmt":"2020-01-10T09:28:55","slug":"uk-charities-are-bigger-cyber-attacks-targets-than-they-realise","status":"publish","type":"post","link":"https:\/\/networkportfolio.co.uk\/ncinsurance.co.uk\/thirdsectorprotect\/blog\/uk-charities-are-bigger-cyber-attacks-targets-than-they-realise\/","title":{"rendered":"UK charities are bigger cyber-attacks targets than they realise."},"content":{"rendered":"<p><strong>UK Charities are bigger cyber-attack targets than they realise<\/strong><\/p>\n<p>Many charities, especially the smaller ones, fail to realise the value of the data they possess, according to a report by the National Cyber Security Centre (NCSC). Unfortunately, cybercriminals do realise the value of this data, making charities vulnerable targets to a cyber-attack.<\/p>\n<p>While the average person may find it unconscionable to steal from a charity, there are a number of perpetrators looking for some financial gain, besides the typical cyber-criminal. These include:<\/p>\n<ul>\n<li>Suppliers and third parties- It&#8217;s common for charities to outsource the responsibilities of running, maintaining and securing their data.<\/li>\n<li>Terrorists- Terrorist groups are likely to deface websites and publish victims&#8217; personal details online, which is a process known as doxing.<\/li>\n<li>Nation states- Nation-states use cyber-crime to further their agendas.<\/li>\n<li>Insiders- Disgruntled staff with access to employer&#8217;s data may commit cyber-crimes seeking money or simply for revenge.<\/li>\n<li>Hacktivists- Hackers may target charities if they disagree with the charity&#8217;s purpose or are motivated by a specific cause.<\/li>\n<\/ul>\n<p>In order to prevent cyber-criminals from accessing your charity&#8217;s valuable data, the <a href=\"https:\/\/www.ncsc.gov.uk\/news\/advice-thwart-devastating-cyber-attacks-small-charities\"><strong>NCSC Small Charity Guide<\/strong> <\/a>recommends taking these precautions:<\/p>\n<ul>\n<li>Back up your data and protect it with strong passwords.<\/li>\n<li>Protect your organisation from malware.<\/li>\n<li>Keep your smartphones and tablets safe.<\/li>\n<\/ul>\n<p><strong>Use strong passwords to protect against cyber-threats<\/strong><\/p>\n<p>Here is an example of the small differences in passwords and how it can make a huge difference to would-be cyber-attackers.<\/p>\n<table style=\"height: 243px; border-color: #000000;\" border=\"3\" width=\"407\">\n<tbody>\n<tr>\n<td style=\"width: 195px; text-align: center;\"><strong>Password<\/strong><\/td>\n<td style=\"width: 196px; text-align: center;\"><strong>Time to crack in 2018<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 195px; text-align: center;\">charity<\/td>\n<td style=\"width: 196px; text-align: center;\">22 milliseconds<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 195px; text-align: center;\">Charity<\/td>\n<td style=\"width: 196px; text-align: center;\">18 hours,<\/p>\n<p>58 minutes,<\/p>\n<p>27 seconds<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 195px; text-align: center;\">Charity1<\/td>\n<td style=\"width: 196px; text-align: center;\">5 months,<\/p>\n<p>2 weeks,<\/p>\n<p>3 days<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 195px; text-align: center;\">CharityNo1<\/td>\n<td style=\"width: 196px; text-align: center;\">1 millennia,<\/p>\n<p>7 centuries,<\/p>\n<p>6 decades<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3><strong>ThirdSectorProtect<\/strong><\/h3>\n<p><em>For additional information on protecting your charity, read our\u00a0past blog post,<strong>\u00a0<a href=\"https:\/\/www.networkportfolio.co.uk\/ncinsurance.co.uk\/thirdsectorprotect\/2018\/07\/25\/is-your-charity-doing-enough-to-protect-its-trustees\/\" target=\"_blank\" rel=\"noopener noreferrer\">Is your charity doing enough to protect its trustees?<\/a><\/strong><\/em><\/p>\n<p><em>For more tips and tricks on all things <\/em>third<em> sector follow us on <a href=\"https:\/\/www.facebook.com\/ThirdSectorProtect\/\"><strong>Facebook<\/strong><\/a>, <a href=\"https:\/\/twitter.com\/ThirdSecProtect\"><strong>Twitter<\/strong><\/a>\u00a0&amp;\u00a0<a href=\"https:\/\/www.linkedin.com\/showcase\/thirdsectorprotect\/\"><strong>LinkedIn<\/strong><\/a>. Or for any enquires regarding a current or future insurance policy visit our <a href=\"https:\/\/www.networkportfolio.co.uk\/ncinsurance.co.uk\/thirdsectorprotect\/\"><strong>website<\/strong><\/a> or give us a call on 0800 877 8277<\/em><\/p>\n<table style=\"height: 32px;\" width=\"124\">\n<tbody>\n<tr>\n<td style=\"width: 34px;\"><a href=\"https:\/\/www.facebook.com\/ThirdSectorProtect\/\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-2152\" src=\"https:\/\/www.networkportfolio.co.uk\/ncinsurance.co.uk\/thirdsectorprotect\/wp-content\/uploads\/sites\/6\/2018\/09\/facebook.png\" alt=\"\" width=\"120\" height=\"120\" \/><\/a><\/td>\n<td style=\"width: 34px;\"><a href=\"https:\/\/twitter.com\/ThirdSecProtect\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-2154\" src=\"https:\/\/www.networkportfolio.co.uk\/ncinsurance.co.uk\/thirdsectorprotect\/wp-content\/uploads\/sites\/6\/2018\/09\/twitter.png\" alt=\"\" width=\"120\" height=\"120\" \/><\/a><\/td>\n<td style=\"width: 34px;\"><a href=\"https:\/\/www.linkedin.com\/showcase\/thirdsectorprotect\/\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-2153\" src=\"https:\/\/www.networkportfolio.co.uk\/ncinsurance.co.uk\/thirdsectorprotect\/wp-content\/uploads\/sites\/6\/2018\/09\/LinkedIn.png\" alt=\"\" width=\"120\" height=\"108\" \/><\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>UK Charities are bigger cyber-attack targets than they realise Many charities, especially the smaller ones, fail to realise the value of the data they possess, according to a report by the National Cyber Security Centre (NCSC). Unfortunately, cybercriminals do realise the value of this data, making charities vulnerable targets to a cyber-attack. While the average [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false},"categories":[3,4,6],"tags":[55,92,93],"acf":[],"_links":{"self":[{"href":"https:\/\/networkportfolio.co.uk\/ncinsurance.co.uk\/thirdsectorprotect\/wp-json\/wp\/v2\/posts\/2158"}],"collection":[{"href":"https:\/\/networkportfolio.co.uk\/ncinsurance.co.uk\/thirdsectorprotect\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/networkportfolio.co.uk\/ncinsurance.co.uk\/thirdsectorprotect\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/networkportfolio.co.uk\/ncinsurance.co.uk\/thirdsectorprotect\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/networkportfolio.co.uk\/ncinsurance.co.uk\/thirdsectorprotect\/wp-json\/wp\/v2\/comments?post=2158"}],"version-history":[{"count":2,"href":"https:\/\/networkportfolio.co.uk\/ncinsurance.co.uk\/thirdsectorprotect\/wp-json\/wp\/v2\/posts\/2158\/revisions"}],"predecessor-version":[{"id":7213,"href":"https:\/\/networkportfolio.co.uk\/ncinsurance.co.uk\/thirdsectorprotect\/wp-json\/wp\/v2\/posts\/2158\/revisions\/7213"}],"wp:attachment":[{"href":"https:\/\/networkportfolio.co.uk\/ncinsurance.co.uk\/thirdsectorprotect\/wp-json\/wp\/v2\/media?parent=2158"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/networkportfolio.co.uk\/ncinsurance.co.uk\/thirdsectorprotect\/wp-json\/wp\/v2\/categories?post=2158"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/networkportfolio.co.uk\/ncinsurance.co.uk\/thirdsectorprotect\/wp-json\/wp\/v2\/tags?post=2158"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}