{"id":2911,"date":"2019-03-15T10:16:55","date_gmt":"2019-03-15T10:16:55","guid":{"rendered":"https:\/\/www.networkportfolio.co.uk\/ncinsurance.co.uk\/thirdsectorprotect\/?p=2911"},"modified":"2019-09-09T10:41:04","modified_gmt":"2019-09-09T09:41:04","slug":"charity-phishing-scams","status":"publish","type":"post","link":"https:\/\/networkportfolio.co.uk\/ncinsurance.co.uk\/thirdsectorprotect\/blog\/charity-phishing-scams\/","title":{"rendered":"Phishing Scams: The emerging threat to charities"},"content":{"rendered":"<h1><span style=\"font-family: 'arial black', sans-serif; font-size: 18pt;\">Phishing Scams<\/span><\/h1>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">Phishing scams are as dangerous as any other malicious act performed by internet hackers and in recent years approaches have increased in sophistication to make them more successful.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">This comes as more of the general public are educated on cyber security and are taking steps to lower the possibility of falling victim to an attack. This said, attackers are continuously introducing new methods to lower the guard of your average computer user.<\/span><\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-2959\" src=\"https:\/\/www.networkportfolio.co.uk\/ncinsurance.co.uk\/thirdsectorprotect\/wp-content\/uploads\/sites\/6\/2019\/03\/Fishing.jpg\" alt=\"\" width=\"600\" height=\"200\" srcset=\"https:\/\/networkportfolio.co.uk\/ncinsurance.co.uk\/thirdsectorprotect\/wp-content\/uploads\/sites\/6\/2019\/03\/Fishing.jpg 600w, https:\/\/networkportfolio.co.uk\/ncinsurance.co.uk\/thirdsectorprotect\/wp-content\/uploads\/sites\/6\/2019\/03\/Fishing-260x87.jpg 260w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<h2><span style=\"font-family: 'arial black', sans-serif;\">What is a Phishing Attack?<\/span><\/h2>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">Phishing is a method cyber criminals use to steal sensitive information by making the victim believe they are a trustworthy entity, usually over email, but can involve websites and social media accounts, or even mail through the post.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\"> Attackers are able to fake their identity by using techniques like email spoofing and are able to register an email address that looks similar to one you would trust.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">Effective phishing isn&#8217;t about being highly technical, but about being aware of the human condition and understanding how to lower someone&#8217;s guard merely through an email subject line. This is why we find a continued evolution in phishing methods and the methods employed to catch people off guard.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\"> For phishers, it&#8217;s much simpler to find security holes in human behaviour than computers.<\/span><\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-2963\" src=\"https:\/\/www.networkportfolio.co.uk\/ncinsurance.co.uk\/thirdsectorprotect\/wp-content\/uploads\/sites\/6\/2019\/03\/Phishing.jpg\" alt=\"\" width=\"600\" height=\"200\" srcset=\"https:\/\/networkportfolio.co.uk\/ncinsurance.co.uk\/thirdsectorprotect\/wp-content\/uploads\/sites\/6\/2019\/03\/Phishing.jpg 600w, https:\/\/networkportfolio.co.uk\/ncinsurance.co.uk\/thirdsectorprotect\/wp-content\/uploads\/sites\/6\/2019\/03\/Phishing-260x87.jpg 260w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<h2><span style=\"font-family: 'arial black', sans-serif;\">Charity Phishing<\/span><\/h2>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">Phishing scams have recently started to leverage the emotional effect charities have on the public.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\"> In the past, avid anglers would use scare tactics to retrieve sensitive information from unsuspecting victims, using approaches such as &#8220;your account will be deactivated if&#8221; to grab people&#8217;s attention &#8211; a form of cyber extortion we&#8217;ve since been desensitised to.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">Televised disasters like the Grenfell Tower fire or the recent 2018 Florida school shooting are catalysts for cyber criminals, allowing them to tug at the heartstrings a little harder. These types of attacks have seen an increase in the past few months, but it isn&#8217;t a new approach.<\/span><\/p>\n<h2><span style=\"font-family: 'arial black', sans-serif;\">The wider impact<\/span><\/h2>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">With the speed at which news propagates through social media, along with the help of Twitter bots being used to interfere with trending hashtags, phishers are able to use these events to their advantage.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">Fake donation emails and charity websites have started to become the norm for phishers, causing problems for more than just the victim. Donors are made to think they&#8217;re contributing to a legitimate cause, completely unaware that their donation is going into the pockets of fraudsters and not helping those in need.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">In August 2017, Hurricane Harvey was also targeted by malicious individuals aiming to capitalise on the disaster. The US-CERT issued a warning to advise readers that Hurricane Harvey was being used in phishing campaigns. Fraudulent emails were sent requesting donations, while also carrying malicious attachments and links to malware-infected websites. This also happened back in 2008, with the Trend Micro reporting donation scams following the Chinese earthquake. Even more recently the Esterville Police Department warned of donation requests from scammers and subsequent phishing campaigns after the Florida school shooting in February last year.<\/span><\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-2965\" src=\"https:\/\/www.networkportfolio.co.uk\/ncinsurance.co.uk\/thirdsectorprotect\/wp-content\/uploads\/sites\/6\/2019\/03\/Facebook-and-Coffee.jpg\" alt=\"\" width=\"599\" height=\"200\" srcset=\"https:\/\/networkportfolio.co.uk\/ncinsurance.co.uk\/thirdsectorprotect\/wp-content\/uploads\/sites\/6\/2019\/03\/Facebook-and-Coffee.jpg 599w, https:\/\/networkportfolio.co.uk\/ncinsurance.co.uk\/thirdsectorprotect\/wp-content\/uploads\/sites\/6\/2019\/03\/Facebook-and-Coffee-260x87.jpg 260w\" sizes=\"(max-width: 599px) 100vw, 599px\" \/><\/p>\n<h2><span style=\"font-family: 'arial black', sans-serif;\">Staying Protected<\/span><\/h2>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">Protecting yourself is simple, but unfortunately so is falling victim. The key is to remain vigilant when reading an email, instant message or social media post about helping the less fortunate.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">Phishing attacks can be anywhere, not just in your inbox. If you want to donate to an organisation, it is best to go directly to their website. Use websites like <a href=\"https:\/\/www.gov.uk\/government\/organisations\/charity-commission\"><strong>gov.uk&#8217;s<\/strong><\/a> charity commission or <a href=\"http:\/\/give.org\/\"><strong>Give.org<\/strong><\/a>, which allow you to research charities and relief organisations to give you peace of mind that you&#8217;re giving to legitimate charities that aren&#8217;t going to disappear once you&#8217;ve clicked &#8220;send donation&#8221;.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\">If you come across a charity that you suspect is trying to scam you, the best thing to do is report it to the <a href=\"https:\/\/www.gov.uk\/government\/organisations\/charity-commission\"><strong>Charity Commission<\/strong><\/a> and <a href=\"https:\/\/www.actionfraud.police.uk\/\"><strong>Action Fraud<\/strong><\/a>. They will investigate and take down the organisation if they are built on false promises.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\"> It&#8217;s important that phishing attempts are reported, not just deleted. Working as a community can help to fix this problem and ensure donations are sent to legitimate charities and not phonies.<\/span><\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-2967\" src=\"https:\/\/www.networkportfolio.co.uk\/ncinsurance.co.uk\/thirdsectorprotect\/wp-content\/uploads\/sites\/6\/2019\/03\/Padlock.jpg\" alt=\"\" width=\"600\" height=\"200\" srcset=\"https:\/\/networkportfolio.co.uk\/ncinsurance.co.uk\/thirdsectorprotect\/wp-content\/uploads\/sites\/6\/2019\/03\/Padlock.jpg 600w, https:\/\/networkportfolio.co.uk\/ncinsurance.co.uk\/thirdsectorprotect\/wp-content\/uploads\/sites\/6\/2019\/03\/Padlock-260x87.jpg 260w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<h3><span style=\"font-family: 'arial black', sans-serif;\">ThirdSectorProtect<\/span><\/h3>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\"><em>Beyond taking these steps to reduce the chances of phishing attacks<\/em><\/span><span style=\"font-family: arial, helvetica, sans-serif;\"><em>, its vital to ensure that you are properly covered should phishing scams occur. Contact our expert team at <a href=\"https:\/\/www.networkportfolio.co.uk\/ncinsurance.co.uk\/thirdsectorprotect\/\"><strong>ThirdSectorProtect<\/strong><\/a> to learn more about <a href=\"https:\/\/www.networkportfolio.co.uk\/ncinsurance.co.uk\/thirdsectorprotect\/who-we-cover\/\"><strong>reducing your charities risk with insurance.\u00a0<\/strong><\/a><\/em><\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\"><em>For more information on handling fraud risks within your charity, read another of our blog posts:<\/em><\/span><\/p>\n<ul>\n<li><span style=\"font-family: arial, helvetica, sans-serif;\"><em><strong><a href=\"https:\/\/www.networkportfolio.co.uk\/ncinsurance.co.uk\/thirdsectorprotect\/2019\/01\/07\/charity-scam-charity-insurance\/\">2019&#8217;s newest charity scam.<\/a><\/strong><\/em><\/span><\/li>\n<li><strong><em><span style=\"font-family: arial, helvetica, sans-serif;\"><a href=\"https:\/\/www.networkportfolio.co.uk\/ncinsurance.co.uk\/thirdsectorprotect\/2019\/02\/08\/charity-fraud-2\/\" target=\"_blank\" rel=\"noopener noreferrer\">Top 5 charity fraud scams posing a threat in 2019<\/a><\/span><\/em><\/strong><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;\"><em><strong><a href=\"https:\/\/www.networkportfolio.co.uk\/ncinsurance.co.uk\/thirdsectorprotect\/2018\/10\/02\/attacking-from-the-inside\/\">How to prevent fraud within your charity.<\/a><\/strong><\/em><\/span><\/li>\n<\/ul>\n<p><span style=\"font-family: arial, helvetica, sans-serif;\"><em>For more tips and tricks on all things related to charities, not-for-profits and community groups,\u00a0 follow us on\u00a0<a href=\"https:\/\/www.facebook.com\/ThirdSectorProtect\/\"><strong>Facebook<\/strong><\/a>,\u00a0<a href=\"https:\/\/twitter.com\/ThirdSecProtect\"><strong>Twitter<\/strong><\/a>\u00a0&amp;\u00a0<a href=\"https:\/\/www.linkedin.com\/showcase\/thirdsectorprotect\/\"><strong>LinkedIn<\/strong><\/a>.\u00a0<\/em><\/span><\/p>\n\n\n<table class=\"wp-block-table has-fixed-layout\"><tbody><tr><td><a href=\"https:\/\/www.facebook.com\/ThirdSectorProtect\/\"><img decoding=\"async\" loading=\"lazy\" width=\"120\" height=\"120\" class=\"wp-image-5841\" style=\"width: 80px;\" src=\"https:\/\/www.networkportfolio.co.uk\/ncinsurance.co.uk\/thirdsectorprotect\/wp-content\/uploads\/sites\/6\/2019\/02\/Facebook-tsp.png\" alt=\"\"><\/a><\/td><td><a href=\"https:\/\/twitter.com\/ThirdSecProtect\"><img decoding=\"async\" loading=\"lazy\" width=\"120\" height=\"120\" class=\"wp-image-5842\" style=\"width: 80px;\" src=\"https:\/\/www.networkportfolio.co.uk\/ncinsurance.co.uk\/thirdsectorprotect\/wp-content\/uploads\/sites\/6\/2019\/02\/twitter-tsp.png\" alt=\"\"><\/a><\/td><td><a href=\"https:\/\/www.linkedin.com\/showcase\/thirdsectorprotect\/\"><img decoding=\"async\" loading=\"lazy\" width=\"120\" height=\"108\" class=\"wp-image-5843\" style=\"width: 80px;\" src=\"https:\/\/www.networkportfolio.co.uk\/ncinsurance.co.uk\/thirdsectorprotect\/wp-content\/uploads\/sites\/6\/2019\/02\/LinkedIn-tsp.png\" alt=\"\"><\/a><\/td><td><a href=\"https:\/\/www.youtube.com\/channel\/UCde_Q-wjnOd8RZCb__LzbHQ\/\"><img decoding=\"async\" loading=\"lazy\" width=\"120\" height=\"85\" class=\"wp-image-5844\" style=\"width: 80px;\" src=\"https:\/\/www.networkportfolio.co.uk\/ncinsurance.co.uk\/thirdsectorprotect\/wp-content\/uploads\/sites\/6\/2019\/02\/Youtube-tsp.png\" alt=\"\"><\/a><\/td><td><\/td><td><\/td><\/tr><\/tbody><\/table>\n","protected":false},"excerpt":{"rendered":"<p>Phishing Scams Phishing scams are as dangerous as any other malicious act performed by internet hackers and in recent years approaches have increased in sophistication to make them more successful. This comes as more of the general public are educated on cyber security and are taking steps to lower the possibility of falling victim to [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":2501,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false},"categories":[3,6,14,15],"tags":[142,143,144,145],"acf":[],"_links":{"self":[{"href":"https:\/\/networkportfolio.co.uk\/ncinsurance.co.uk\/thirdsectorprotect\/wp-json\/wp\/v2\/posts\/2911"}],"collection":[{"href":"https:\/\/networkportfolio.co.uk\/ncinsurance.co.uk\/thirdsectorprotect\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/networkportfolio.co.uk\/ncinsurance.co.uk\/thirdsectorprotect\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/networkportfolio.co.uk\/ncinsurance.co.uk\/thirdsectorprotect\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/networkportfolio.co.uk\/ncinsurance.co.uk\/thirdsectorprotect\/wp-json\/wp\/v2\/comments?post=2911"}],"version-history":[{"count":2,"href":"https:\/\/networkportfolio.co.uk\/ncinsurance.co.uk\/thirdsectorprotect\/wp-json\/wp\/v2\/posts\/2911\/revisions"}],"predecessor-version":[{"id":6018,"href":"https:\/\/networkportfolio.co.uk\/ncinsurance.co.uk\/thirdsectorprotect\/wp-json\/wp\/v2\/posts\/2911\/revisions\/6018"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/networkportfolio.co.uk\/ncinsurance.co.uk\/thirdsectorprotect\/wp-json\/wp\/v2\/media\/2501"}],"wp:attachment":[{"href":"https:\/\/networkportfolio.co.uk\/ncinsurance.co.uk\/thirdsectorprotect\/wp-json\/wp\/v2\/media?parent=2911"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/networkportfolio.co.uk\/ncinsurance.co.uk\/thirdsectorprotect\/wp-json\/wp\/v2\/categories?post=2911"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/networkportfolio.co.uk\/ncinsurance.co.uk\/thirdsectorprotect\/wp-json\/wp\/v2\/tags?post=2911"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}