Press Release: Charities to benefit from Cyber-Security campaign


Charities to benefit from Cyber-Security campaign

UK charities play a make a major contribution in supporting their chosen groups throughout the UK.  For many people, the support from charities is literally a lifeline. Their work, however, also necessitates that they hold personal, commercial and financial information which has a clear value to cyber-criminals.  Coupled with a reliance on IT, this sadly means charities are as vulnerable to cyber-attacks as any other business

Addressing resilience within charitable organisations can be a challenge.  Many do not perceive themselves as open to the cyber-threat; a threat which, in reality, is unbiased as to an organisation’s size or sector.  Whilst targeted attacks are still commonplace, so too are attacks which target a vulnerability rather than a specific person or organisation.  Be it targeted or not, the consequences of a cyber-breach can be devastating.

The IASME Consortium, a leading Accreditation Body for the government backed Cyber Essentials certification scheme, is launching a week-long campaign aimed at encouraging registered charities to improve their resilience to on-line threats.  Together with participating certification bodies, IASME is offering discounted certifications on schemes which demonstrate charities have recognised best practice protections in place. IASME’s support for the third sector will take place between 29 April and 3 May 2019.

The IASME Consortium package includes the widely recognised Cyber Essentials scheme.  This scheme assesses against 5 core technical controls which, had they been in place, would have prevented the majority of successful attacks in recent years. The 5 technical controls are anti-malware, access control, patching, secure configuration and firewalls.

IASME will also be offering its own award-winning governance standard as part of the promotion.  IASME Governance, which includes a Cyber Essentials assessment and a GDPR check, is an information security management standard which is more practical for SMEs than the traditional ISO27001.  Taken simultaneously with Cyber Essentials, IASME governance covers additional protections such as physical security, data back-ups and staff awareness.

Dr Emma Philpott, Chief Executive of The IASME Consortium stated, “Charities work tirelessly to secure donations for fantastic causes. Having the right safeguards against unscrupulous cyber activity can help protect the donations and also any sensitive information that a charity might hold.”

The IASME Consortium licenses a network of certification bodies including TeraByte, based in Darlington.  Marcus Dempsey, Operations Director, stated, “We had no hesitation in participating in this campaign.  Charities do so much to help society and TeraByte want to help ensure that every available penny goes to where it can make a real difference.”

Interested charities can find further information and apply via the TeraByte’s website or contact TeraByte on 01325 628587.


IASME Consortium

IASME is one of just five companies appointed as Accreditation Bodies for assessing and certifying against the Government’s Cyber Essentials Scheme.

Cyber Essentials is a Government backed scheme, industry supported, scheme to help organisations protect themselves against common cyber-attacks.

IASME Governance standard has been recognised by UK Government, in consultation with trade associations and industry groups, as the best cyber security standard for small companies.

Campaign discounts.  Cyber Essentials usual price £300, campaign price £225.    IASME Governance usual price £400, campaign price £250.  All prices are quoted exc. VAT.

IASME Partners are the IASME trained and licensed Certification Bodies authorised to conduct the assessments to Cyber Essentials and IASME Governance.

Charities to apply for the discounted assessments via (CB to add details of their campaign page).

Contact: Chris Pinder

03300 882752     [email protected]

Previous Post
Brexit: No deal impact on cross-border data flows
Next Post
Vulnerability assessments vs Penetration tests

Related Posts

No results found.