Insights
Small charities can often put off risk assessment, due to perceived levels of cost and difficulty. But these charities are at the greatest risk from cyber attack
Risk is an everyday part of charitable activity and managing it effectively is essential if the trustees are to achieve their key objectives and safeguard their charity’s funds and assets, according to the Charity Commission. For that reason, it recommends that all charity leaders regularly assess the risks faced by their charities in all areas of its work.
A cyber security risk assessment can be particularly helpful because, amongst other benefits, it will enable your charity to:
A cyber security assessment may also be a prerequisite for compliance with regulations such as the General Data Protection Regulation (GDPR).
Carrying out a cyber security risk assessment involves six steps:
1.) Understand your IT setup
The first step is to identify which IT systems are critical to service delivery, fundraising, financial operations, customer data security, and any other activities which are critical to the functioning of your charity.
Once you understand this you are in a position to assess the various cyber security risks that they face.
2.) Identify cyber security threats
Cyber security is all about risk management, and to manage cyber security risks successfully, you need to be able to identify and assess them first. The most common types include:
3.) Determine the impact if a threat actually transpired
Using some of the examples above, this step aims to assess how bad it would be for your charity if there was a successful ransomware attack, or if a staff member lost their laptop.
In most cases it is sufficient to assign one of three impact levels to an event:
You may find it more appropriate to take a more granular approach using four or five levels, e.g.
4.) Assess the likelihood of each threat happening
The next part of the puzzle is to work out a likelihood rating for each risk.
That means, for example, how likely are you to fall victim to ransomware and lose access to your data, despite the anti-ransomware software (if any) that you have, and the data backups (if any) that you have. Clearly, if you do not have any anti-ransomware software and any backups then your operations are much more likely to be disrupted by ransomware than if you have both of these in place.
Rather than an exact figure, you can use a likelihood rating system like:
As with your impact ratings, you may also choose to use a more granular likelihood rating system with four or five levels, rather than the three described above.
5.) Work out your risk rating score
Your risk rating score for a given risk = impact x likelihood
To calculate this you can assign (semi-arbitrary) values to impact, like 100 for high, 50 for medium, and 10 for low, and also to likelihood, such as 1 for high, 0.5 for medium, and 0.1 for low.
You will then end up with a table of risk ratings that could look like this:
Threat |
Impact |
Likelihood |
Risk rating score |
Conclusion |
Hacker attack |
High (=100) |
Medium (=0.5) |
100 x 0.5 = 50 |
Medium/ needs attention |
Ransomware |
High (=100) |
Low (=0.1) |
100 x 0.1 = 10 |
Low/Satisfactory |
Emailing data to wrong recipient |
Low (=10) |
High (=1) |
10 x 1 = 10 |
Low/Satisfactory |
Insider attack |
High (=100) |
High (=1) |
100 x 1 = 100 |
Critical/needs immediate attention |
xxx |
xxx |
xxx |
xxx |
xxx |
6.) Draw up a risk mitigation action plan
The resulting table with risk rating scores is the key takeaway of a cyber risk assessment. That’s because it summarises all the risks you have identified, the impacts they could have, and the likelihood that they will come to pass in spite of any existing cyber security or other mitigation measures you have in place.
The risk rating scores allow you to identify the most critical threats that you need to address and focus your resources on mitigating them as a matter of urgency rather than wasting money and other resources on cyber security activities which are less important.
Our courses aim, in just three hours, to enhance soft skills and hard skills, boost your knowledge of finance and artificial intelligence, and supercharge your digital capabilities. Check out some of the incredible options by clicking here.