Charities often make attractive targets due to the personal and sensitive data the hold as well as perceived weaker security. There are a number of common attacks that lead to a large percentage of cyber insurance claims and present a risk to charities.
Social engineering is an umbrella term for a number of tactics used to manipulate people into giving access to systems, sharing confidential information or redirecting payments.
Criminals use common methods such as:
To combat these types of attack, a strong culture of security and education is needed to ensure all staff, volunteers, beneficiaries and system users are using strong password management and multi-factor authentication across the systems they have access to. It is also vital for people have a basic understanding of what to look for in a suspicious email or call and how to report it.
Setting up proper access control will reduce the risk of bad actors gaining access, as some users will not have the same access as others. Good cyber-security software will also detect potential hackers and attacks, automatically blocking access and alerting the administrator. This setup also reduces the risks of bad actors or simple human error within the organisation.
Strong due diligence and verification processes will help mitigate against any payment diversions, scams or fraud.
To mitigate against these threats, a similar approach is needed with strong access control management and staff/volunteer training on how to handle data and use the systems securely. Offboarding procedures should also be taken into account with access control and senior leaders should encourage people to report things that don’t seem right.
Charities, like businesses, will often use third-party tools and vendors to manage services such as payments, CRMs, cloud storage or web hosting. This gives rise to its own risk – attackers increasingly exploit vendors and suppliers to steal data and potentially gain access to multiple other organisations’ data.
Although limits on access can be placed on third-parties, you will have limited control or visibility over the cybersecurity practices of your suppliers, making it harder to detect weaknesses in the chain.
Some potential examples of this happening include:
Managing this risk is partly down to due diligence and building trusted relationships with suppliers – it being wise to seek information about their data protection and security procedures. Defining in and reviewing contracts on who is responsible for data breaches and data handling is a vital step to being prepared if a cyber incident should occur.
While many cyber threats can be effectively mitigated through staff training, strong access controls, and keeping systems up to date, the frequency and sophistication of attacks continue to grow. As the potential financial and reputational damage increases, cyber insurance is also evolving to address the changing risk faced by charities.
Access Insurance will be breaking down to top cyber concerns for charities in their upcoming webinar on the 16th September 2025 2pm. Tim Larden, Sales & Marketing Director at Access Insurance unpacks the cyber risks that charities should be ready for, how to manage them with best practices, and what can and can’t be insured with cyber insurance.
Reserve your spot
Access all our articles and search the provider directory for free.