Practical Guides

Cyber Incident Response for Charities: What to Do When Something Goes Wrong

When a charity suffers a cyberattack or data breach, the response must address multiple simultaneous obligations: protecting beneficiaries from harm caused by data exposure; notifying the ICO within 72 hours if required; reporting to the Charity Commission for serious incidents; communicating with donors and supporters; managing media and reputational risk; and restoring operations to continue delivering charitable services. Having a clear, simple incident response procedure — planned before an incident occurs — dramatically improves outcomes.

Charities with a documented incident response procedure notify the ICO an average of 18 hours earlier following a breach — reducing regulatory risk and demonstrating governance competence.

Charity-Specific Incident Response Steps

When a charity detects a potential cyber incident: immediately report to the named Data Protection Lead and senior management; assess the scope — what systems are affected, what data may be involved, how many people are affected; contain the incident — isolate affected systems where possible without destroying evidence; begin the 72-hour ICO notification clock — once you are aware of a breach likely to cause risk to individuals, you have 72 hours to notify, regardless of how complete your information is; assess whether the incident is a serious incident for Charity Commission reporting purposes (significant data breach, fraud, or operational disruption that threatens charitable purposes); notify affected beneficiaries if the breach creates high risk to them (beneficiary safety must be the first consideration); and engage your cyber insurer if you have one.

Communication During a Charity Cyber Incident

Communication during a charity cyber incident must be managed carefully across multiple audiences: beneficiaries (prioritise the safety and wellbeing of affected individuals — consider whether any beneficiaries face physical risk as a result of the breach, such as domestic abuse clients whose location data may be exposed); donors and supporters (honest, prompt communication maintains trust better than delayed or minimised disclosure); staff and volunteers (clear guidance on what has happened, what they should and should not communicate, and what they should do if contacted by media or the public); media (a clear factual statement with no speculation about causes or scope until investigation is complete); and trustees (full briefing as soon as possible — trustees have governance responsibility and need to understand the incident). Kyanite Blue's incident response retainer service includes communications support for charity clients.

Kyanite Blue specialises in cybersecurity for iGaming operators. MGA-licensed operators across Malta trust our stack.

Get in touch

Ready to secure your iGaming operation?

MGA-licensed operators across Malta trust Kyanite Blue.