Contact Us

Contact Us

Please get in touch using the form below

I prefer to be contacted by:
View our privacy policy
Read a post-mortem analysis of the infamous Emotet botnet. Download our whitepaper.

Overview

Cyber Security for the third sector

When your organisation provides a vital lifeline for people and communities, the impact of a cyber-attack could be disastrous. With the third sector commonly viewed as an easy target by cybercriminals, it is essential to manage and mitigate the risks to the sensitive data you hold.

In its report, The Road Ahead 2020, the NCVO highlights the urgent need for charities and not-for-profit organisations to take a proactive approach to addressing the risks of cybercrime. Phishing, ransomware, malicious insiders and other types of threats have the potential to inflict significant damage.

Challenges

Do these challenges sound familiar?

Safeguarding the personal information of donors and supporters
Protecting aging IT infrastructure against threats
Identifying and managing security exposures across the supply chain
Safeguarding legacy systems alongside new technologies
Identifying and responding to breaches
Educating staff about cyber risks such as phishing and ransomware
44%
of charities have no protections against attacks
52%
of high-income charities identified attacks in 2019
€20m
maximum GDPR fine for an unreported data breach

Key questions

Key security questions you need to ask

  • Is data protected against unauthorised processing?
  • How often are networks and websites tested for vulnerabilities?
  • Are security controls in place to prevent sophisticated threats?
  • Are staff sufficiently trained about cyber security risks?
  • Is there a plan in place to detect, remediate and report breaches?
  • Is donation processing PCI DSS compliant?

Compliance

Cyber security compliance in the
nonprofit sector

Protecting the personal and financial data of donor and employees is central to not-for-profit organisations meeting the compliance requirements of the General Data Protection Regulation, the Data Protection Act 2018 and the Payment Card Industry Data Security Standard.

At Redscan, our experience of working with charities and other not-for-profit organisations means that we are better placed to understand the security challenges your organisation faces and deliver solutions that address them.

Need advice or help from our friendly team?

Get in touch

Our Services

Our award-winning services

Redscan’s security services are designed to provide the vital assistance needed to make tangible improvements to your organisation’s cyber security posture.

ThreatDetect MDR

Managed Detection and Response

Award-winning support to rapidly detect and respond to the latest threats 24/7

Read more

Assessment Services

Specialist engagements to uncover and address hidden cyber security risks

Read more
A person choosing from a range of Managed Security Services

Managed Security Services

Expert help to manage and monitor your choice of security technologies

Read more

What our customers say

5/5 - based on 16 Reviews
“With so much organisational change, this is a time of incredible pressure on our small team. Partnering with Redscan is making it easier for us to address the security challenges of business consolidation.”
Head of IT Security
IPL Plastics
“If you want a solution where someone will look after you 24/7 and give you a very flexible, professional and agile service - you want Redscan.”
Lead IT Infrastructure Architect
Pizza Hut Restaurants
“The penetration testing that Redscan performed provided some very credible findings and outlined clear improvements that we were able to implement. The whole process raised the bar of our cyber security defences.”
Head of Cyber Security
Specialist Bank
“Redscan staff are always on hand to provide swift, clear advice. They help us keep a constant eye on our network and respond quickly to incidents to ensure systems remain operational.”
IT Director
King Edward VII's Hospital
“I can offer a higher level of assurance at board level about our information security now. Redscan gives us a broader lens on a complex and changing environment.”
IT Director
ICG
"Redscan's cost effective service gives us peace of mind that we are doing all we can to protect our clients, our business, our staff, our counterparties and other partners."
Head of IT Infrastructure
TT International
“Faster incident alerting enables us to better understand what is going on in our network and react more quickly. From an advice side of things, it’s great to be able to talk to knowledgeable people and discuss solutions to help mitigate our security risks.”
Head of IT Security
IPL Plastics
“With Redscan, we are able to understand and quickly identify any threats. Redscan’s support gives us the freedom to feel more secure and be more productive.”  
Head of IT
Bernhard Schulte Shipmanagement
“Redscan’s hands on approach identified security flaws that had previously been overlooked by other vendors.”  
Technical Operations Manager
Spread Betting Firm
“I definitely recommend ThreatDetect. It’s an incredible managed security service. By working in partnership with Redscan, we have significantly improved our operational resilience.”  
Head of Cyber Security
Specialist bank
“Thanks to Redscan we now have a solution that gives us the ability to monitor, isolate and eliminate threats across our IT infrastructure.”
Head of IT
King Edward VII's Hospital
"Should I need any security testing again in the future, Redscan would be my first port of call!"
Project Analyst/Developer
STM Life
“We have been very impressed by the quality of Redscan’s engagement, communication and reporting. We will not hesitate to use them for any future testing requirements.”      
Information Security Officer
White Oak (formerly LDF)
“The personal approach is something I noticed from my first engagement with Redscan and it is still true today. We have 30 locations worldwide and it is valuable to have a third party being proactive in identifying potential security issues.”
Head of IT
Bernhard Schulte Shipmanagement
“Services like ThreatDetect are few and far between.”
Head of IT Infrastructure
TT International
“I value the fact that Redscan aggregates insight about the cyber-attacks it sees on other customers and retrospectively applies it to other organisations, so we all benefit from that knowledge.”  
Head of Cyber Security
Specialist bank

About us

Why choose Redscan?

  • A leading UK-based MDR company
  • Red and blue team CREST CSOC expertise
  • High-quality intelligence and actionable outcomes
  • Quick and hassle-free service deployment
  • An agnostic approach to technology selection
  • Avg. >9/10 customer satisfaction, 95% retention rate

Request expert support

Complete the form for a prompt response from our team.

 

Two Redscan team members analysing cyber security intelligence

I prefer to be contacted by:
View our privacy policy

Resources

Discover our latest content and resources

From the blog
From the blog Case studies Latest news
24th February 2021
Cyber attacks reported as rising by 20% in 2020
A new report has highlighted that pandemic-related threats contributed to a 20% increase in cyber security threats in 2020.  
16th February 2021
Redscan’s NIST NVD analysis reveals record number of critical and high severity vulnerabilities in 2020
Our new report explores the more than 18,000 Common Vulnerabilities and Exposures (CVEs) logged to NIST’s National Vulnerability Database in 2020. It reveals that well over half (57%) were rated ‘high’ or ‘critical’ severity – the highest recorded figure for any year to date. Read the report here.
9th February 2021
Only a third of UK organisations offer cyber security training for remote workers
According to a new report, just a third of UK organisations have offered staff working from home any cyber security training, despite the rapid rise in remote working.  
2nd February 2021
UKRI suspends services due to ransomware attack
UK government body, UK Research and Innovation (UKRI), has had to take a number of services offline while it investigates a ransomware attack on its systems which took place at the end of January. The attack led to the encryption of data by a third party and affects a number of its online assets.