1. Home
  2. /
  3. 2021

Cyber security tips for charities

According to a 2021 report by the Department for Digital, Culture, Media & Sport, more than a quarter of charities (26%) reported having cyber security breaches or attacks in the 12 months preceding the date of their analysis. Larger charities are more likely to be affected by cybercrime, with 50% of high-income charities (£500k or more) and 68% of very high-income organisations (over £5m) reporting that they have experienced breaches within a 12-month period.

These worrying statistics are accompanied by reports of triple-digit increases in cyberattacks. With no slowdown in sight for security breaches, it is more important than ever for organisations to ensure that their systems are protected as well as can be. For smaller charities and non-profit enterprises, this may present certain challenges from a finance and training perspective. However, there are simple steps that charities of all sizes can take to safeguard their data & protect confidential information relating to donors, trustees, and other stakeholders.

Below we have outlined some of the most important areas that charities need to consider when assessing their IT systems and security.

Ensure that you are securely backing up your data

Whatever the size of your organisation, you are likely to be storing vital documents that would impede your progress if lost. Information such as donor and volunteer details, governing and compliance documents, invoices and payment details must all be stored very carefully. Therefore, all charities must take steps to back up regularly and ensure that important files are not just stored on local machines. Storing all your critical files in the cloud is highly advisable, however, you do need to take care when migrating to a cloud system.

Take steps to protect your charity from malware

The WannaCry outbreak in 2017 is an example of malicious software, or ‘malware’ for short, that affected charities as well as businesses and other types of organisations. To protect your charity against malware attacks like this it is important to use antivirus on all computers, laptops or any other devices that connect to your server. You should prevent trustees, volunteers, and staff from downloading any suspicious apps using one of your organisation’s devices (or prevent them from accessing important data from devices that belong to them but have not been security checked).

It’s also very important to keep all your IT equipment and software up to date (patching) and to ensure there are controls in place in terms of how USB drives and memory cards are used. It’s a good idea to encourage staff to transfer data via cloud storage or email rather than use memory sticks which can be unwittingly infected.

Make sure any smartphones or tablets are safe for use by staff and volunteers

Many charitable organisations have staff and volunteers working “in the field”, where it’s essential for them to be able to access the central server using a mobile device. As such, it’s very important to ensure that these devices are configured properly and connect to your server in the most secure way possible. Essential steps to take to on this front include ensuring adequate password protection is in place; making sure that you can track, lock, and wipe any lost or stolen devices; making sure each device is regularly checked and updated; ensuring apps on each device are updated to the latest versions and ensuring staff and volunteers do not connect to your server using unknown Wi-Fi hotspots.

Look at ways of using passwords to protect your data

All the devices used by people within your charity will contain sensitive data such as the personal information of donors, supporters, trustees, volunteers, and staff members. It is essential that this information is available to you and other senior people in the management team but not to unauthorised users. Steps you can take on this front include using two-factor authentication for access to important accounts; banning the use of predictable or easy passwords; using password manager systems that enable tiered access to different file systems dependent on the seniority of the end-user, and ensuring that default passwords can never be used to access any parts of your server.

Take steps to avoid phishing attacks

Phishing is where cybercriminals send mass communications to many different targets (typically via email) where they ask for sensitive information such as bank details or access to an online account. Often these communications will include a link to a website that imitates a well-known brand or institution. Phishing attacks are becoming increasingly sophisticated, with their communications and websites looking near-identical to the brands they are imitating.

There are several things you can do to try to mitigate the impact of a phishing attack. This includes configuring your accounts and devices so that only very senior people within your organisation have access to the most sensitive data; offering basic training to staff and volunteers so that they are equipped with the skills to understand what a potential phishing communication looks like; regularly scan your IT systems for evidence of any irregularities, and put in place spam detection software to help syphon suspicious inbound mail.

Get assistance assessing the IT infrastructure of your charity

Are you concerned about the IT setup or security of your charity’s systems and servers? The team at help4IT have many years of experience providing IT support for charities, non-profits, and NGOs. Read how we assisted Age UK and Meals on Wheels, or simply call us for an informal chat with one of our friendly IT consultants.

Windows 11 Has Landed

Prepare for Migration

Windows 11 was released to great acclaim on October 5 2021. Our technical support team have been testing Windows 11 for a few weeks now as well as having great looking user interfaces, it builds on all of the great improvements in Microsoft security over recent years to bring to market to deliver Microsoft’s most secure operating system yet and it’s going to help businesses be a lot more productive.

As the biggest Windows update since 2015, there’s some prep work your business needs to do if you run Windows 10 or earlier and Microsoft 365.

Prepare Your Business For Migration

The update process for Windows 10 users isn’t as straightforward as clicking an upgrade button. There are a number of system requirements that all of your business devices need to meet in order to run Windows 11, as well as some best practice safety steps that you will need to take, including creating recovery drives and backups, to ensure you avoid interruption to your business.

Unfortunately, if your existing PCs or laptops don’t meet the strict hardware requirements – key issues might be that there is not enough free memory, or perhaps your processors aren’t fast enough – you’ll need to upgrade your devices before you can progress to working on Windows 11.

As well as the possible cost implication of new hardware purchases, there is also a global chip shortage that is impacting on the supply chain of technology components and is currently reducing the availability of new computers.

To avoid disruption to your business, you need to plan ahead if you are considering upgrading to Windows 11

Download our free guide to Windows 11, get prepared and get ahead of your competitors today.

The key features of an excellent IT support help desk

An IT help desk is a department, either within an organisation or provided by an external contractor, that is responsible for answering the technical questions of the end-users of an IT system. Most major IT companies have help desks to respond to questions from their customers. Questions may be handled by the help desk in various ways including email, telephone, website, or online chat.

Here are some of the key features of an excellent IT support help desk.

Qualified, friendly support staff

The key to any effective help desk is the people who provide the service. End-users of a help desk need to know that their enquiry is going to be dealt with professionally and quickly, therefore empathetic staff with strong interpersonal skills are essential to the delivery of the service. They must also possess the technical skills required to deal with the most common IT issues.

An effective ticketing system

Providing an exceptional standard of IT support to end users can’t be achieved without an efficient technology setup. Ticketing systems enable end-users to keep a record of the issues they raise, monitor the progress of the issues, and allow multiple stakeholders, with different levels of expertise, to collaborate on any complex problems. An effective ticketing system is, therefore, an essential component to a good quality IT support desk.  

An efficient issue tracking system

An essential element of providing above-average IT support is the efficient recording of issues and bugs that end users are experiencing with the hardware and software they are using. IT support companies, therefore, need to ensure that the helpdesk agent, engineers, and managers can keep track of the issues through to their complete resolution. A good tracking system will keep the end-user up to date on the status of the problem.

Monitoring and analytics

An efficient IT support helpdesk should include analytics on the service provider side, enabling IT managers to gain insight into common issues and fixes for end users of IT systems. This valuable data can be used to help make the handling of future support tickets more efficient and satisfactory for the end-user.

A customer feedback feature

IT support companies need to learn from their mistakes and successes, so customer feedback is essential to this process. A good IT help desk should allow end-users to provide the support team with details of how they feel their issue has been dealt with, once the ticket has been closed.

Interested in a review of IT support for your business?

At help4IT, we have been providing exceptional help desk support to our clients since our inception in 2005. It is the foundation stone of our support packages. If you’d like a review of your IT systems, please contact us today.

Close Button

Contact Us

  • This field is for validation purposes and should be left unchanged.
Contact Us scroll