HOW TO DEFEND YOUR ORGANISATION
A recent government-commissioned report, Cyber Security Among Charities, urges awareness of cyber security issues to be improved within the charitable sector. Cyber attacks pose as much of a threat to charities as to businesses, the report concludes. It recommends that charities reinforce their internal controls, rather than just rely upon a common sense approach.
Many charities interviewed expressed strong levels of concern about funds or personal data being stolen, which are seen as existential threats. However, there was less focus on threats to non-personal data, such as malicious software, despite the disruption that these can cause to an organisation’s operations.
Last year’s cyber attack on Comic Relief demonstrates that charitable organisations, large or small, are not immune to the threat of being targeted by malware or ransomware.
In the wake of the WannaCry global ransomware attack, we explore simple steps your charity can take to reduce the risk of being affected by malware such as this. It follows on from our previous online security guide, how to avoid being a victim of phishing scams.
What is malware?
Malicious software, or malware, is software code or virus designed to disrupt the normal working of computer systems or mobile devices. Any exchange of data, such as opening an infected email attachment, visiting a malware hosting website, or importing the content of a USB stick, carries the risk of transferring malware into an organisation’s systems and services.
Malware can be used by fraudsters to capture information from systems, PCs, laptops or portable devices, or to read data entered onto them such as passwords and log on details.
Other names for malware include viruses, worms, trojan horses, spyware and ransomware. Ransomware refers to a particular use of malware, in which a fraudster threatens to make public the victim’s seized data or block access to it, unless a ransom is paid.
Warning signs
- It can be difficult to tell if malware has corrupted a system or device until it prevents the user running applications or accessing data, so preventing infection is the best policy
- Malware can be concealed within a wide range of sources, such as emails, web pages, pop up advertisements and storage devices. These may contain links or attachments to malware-hosting images or documents which, if opened, infect your devices or systems
- The impact of malware infections might include disruption to the running of an organisation’s services, theft of sensitive information or loss of access to critical data
- More often than not, malware attacks are made possible through phishing. Staff awareness of how to spot and block phishing attempts is critical to protect your organisation from falling victim to fraud