Call 020 8651 7420  Email 
Insurance Insights Understanding cyber insurance for charities
15 March 2024

Understanding cyber insurance for charities

Cyber threats and crimes are becoming more common and more sophisticated as criminals try and exploit and extort charities for money and personal data that they hold. Cyber insurance offers cover for the costs associated with the recovery from such incidents.

What’s in this guide?

  • 1. The common cyber threats
  • 2. Vulnerabilities to look out for
  • 3. The scale of damage and recovery
  • 4. Cyber insurance
  • 5. Implementing good risk management

1. The common cyber threats

Charities and not-for-profit organisations often hold sensitive information such as donor data, financial records, and beneficiaries’ personal information. This, combined with less frequently reviewed cyber security, makes them attractive targets for cyber-criminals. The following are some of the most common cyber threats for charities:

  • Phishing is a form of social engineering where cybercriminals attempt to steal sensitive information by posing as a trustworthy entity in emails, texts, social media messages, or calls.
  • Ransomware is malware that encrypts files on a computer system and demands payment for the decryption key. It can cause significant disruption and financial losses for individuals and organisations.
  • Viruses are malware that can replicate themselves and spread to other computers. They could cause damage to computer systems, corrupt files, and steal personal information.
  • Data breaches occur when an unauthorised party accesses personal or sensitive data. They could result in identity theft, financial fraud, fines, extortion and reputational damage.
  • Identity theft/impersonation is the unauthorised use of someone’s personal information and is often combined with phishing attacks.
  • Website hacking/takedowns refer to making a website unavailable to its intended users, often through distributed denial-of-service (DDoS) attacks. Hackers could also edit some code or redirect the site to harmful sites and make your web visitors targets of cybercrime.
  • Online financial fraud can occur through phishing attacks, extortion in ransom demands or stealing donor payment information.
Data Source: NCSC’s Charity Cyber Security Breaches Survey 2022

2. Vulnerabilities to look out for

Staff and volunteers

  • Phishing is a significant risk for charities as volunteers may not have the necessary training or systems to identify these fraudulent emails. Phishing emails have become more sophisticated, and even with robust security measures in place, an external email with a malicious link or attachment can lead to cybercrimes. For example, scammers have used fake invoices and spoofed or impersonated emails to trick individuals into divulging sensitive information or making payments. Clicking on a link in these emails can also result in malware entering the network or unauthorised access to data.

Access issues

  • IT vendor issues present another cybersecurity risk for organisations. Although outsourcing IT maintenance or setup to experts can be beneficial, it can also create vulnerabilities. For example, if the IT vendor is attacked or infiltrated, they could potentially compromise all of their clients through remote connections. Data shows that only 5% of charities review potential cyber security risks their suppliers pose. Therefore, it is vital to ensure IT vendors have implemented appropriate cybersecurity measures to mitigate this risk. These include strong access controls, regularly reviewing their security protocols, and prioritising employee cybersecurity awareness training.
  • Weak passwords pose another vulnerability. Attackers can use various methods to guess passwords, including brute-force attacks or social engineering techniques. To avoid this, don’t use easily guessable, simple or reused passwords and implement two-factor authentication where possible. Again awareness training for employees and volunteers will help reinforce good security practices.

Insider threats from the mishandling of personal data also present a vulnerability. Even leaving hard copies of sensitive information lying around on public display is a potential cyber risk, so it is important to have strong policies in place for accessing and storing personal data.

Whilst backups enable you to restore lost data, if your backup is connected to the same network as the primary system, a malware infection on the main system could also spread to the backup, resulting in multiple corruptions. If criminals perform a ransomware attack, they could access and encrypt the backups too. Therefore, creating an offline backup (not connected to the main system) is vital to mitigate this vulnerability.

3. The scale of damage and recovery

If criminals manage to exploit any of these vulnerabilities, the damage could be severe and can include the following:

Financial losses

  • Ransom payments.
  • Forensic and computer expert costs. Data recovery and clean-up costs.
  • Legal fees, such as e-discovery and notification costs (including credit monitoring and identity protection services).
  • Data protection fines/penalties.
  • Reputational damage.
  • Damage caused by unauthorised access and use of personal, sensitive and payment information.
  • The loss of website control. Negative PR and communications.

Disruption

  • Recovery takes not only money but time. Criminals may have compromised your systems or data in multiple ways to extort you again. This is why a forensic investigator must perform a thorough check of your system.
  • Your normal operations may be disrupted through the downtime of systems and while you get back up and running.

For these reasons, the costs associated with cyber incident recovery can be substantial, often exceeding £200k in the case of a privacy breach, highlighting the importance of proper cyber risk management and considering cyber insurance for charities and not-for-profits.

4. Cyber insurance

Cyber insurance policies typically cover the expenses associated with recovery efforts, including consulting, legal, and advisory services. Such services can be invaluable, especially when it comes to making critical decisions regarding the handling of ransomware payments. They can offer expert advice and guidance on whether or not to negotiate with cybercriminals, taking into consideration the specific circumstances and potential risks.

Policy wordings change regularly due to the evolving and emerging nature of cyber risks, but insurers typically offer cover for the following:

  • Privacy Breach Response: This covers the costs associated with a data breach, including notification and credit monitoring for affected individuals as well as forensic investigations and services.
  • Business Interruption: This covers the losses incurred as a result of a cyber attack that disrupts your operations.
  • Cyber Extortion: This covers the costs associated with responding to a ransomware attack.
  • Liability: This covers the costs associated with legal action taken against your organisation due to a data breach. ICO issues penalties and fines for data protection failures.
  • Crisis Management: This covers the costs associated with managingthe fallout from a cyber attack, including public relations and crisis management.

5. Implementing good risk management

Implementing robust cyber risk management before considering cyber cover is essential. Insurers will often impose specific conditions that must be met before purchasing cyber insurance.

We recommend that you at least take advantage of the Cyber Essentials training for charities, designed by the National Cyber Security Centre.

Some of the standards that insurers will often impose before offering cyber cover:

  • Enabling multi-factor authentication for cloud-based services (e.g. email providers).
  • Only using a Virtual Private Network (VPN) to access your environment.
  • Taking offline backups that will be unaffected by issues with the live environment.
  • Regular training on awareness of cyber threats and preventative measures for staff and volunteers (see Cyber Essentials).

If you have questions about anything in this paper, or would value advice and help in arranging cyber insurance please get in touch with one of our specialist advisers.

Access Insurance has an average rating of 4.8 stars based on 189 customer reviews at feefo