Threat Intelligence

Insider Threats in Charities: Managing Volunteer and Staff Access to Sensitive Data

Charities face an insider threat challenge that is distinctive in its complexity: volunteers are essential to the mission, volunteers may have extensive access to sensitive data, and volunteers are typically not subject to the same vetting, training, and oversight processes as paid staff. The combination of mission-driven trust and limited formal controls creates an environment where insider threats — both accidental and malicious — are disproportionately common. The ICO has investigated multiple charities following data breaches caused by volunteers misusing donor or beneficiary data.

29% of charity data breaches reported to the ICO involve a volunteer or former volunteer — reflecting the unique access management challenges of the voluntary sector.

Insider Threat Risk Factors Specific to Charities

Insider threats in charities are shaped by specific risk factors: high volunteer turnover (charities often have many short-term volunteers who are given broad data access for operational convenience, then leave with that access not promptly removed); trust-based culture (charity environments tend to operate on high levels of interpersonal trust — creating reluctance to question unusual data access or request behaviour); limited IT resource for access management (small charity IT teams cannot implement the same access governance as large commercial organisations); emotional vulnerability of some beneficiary groups (case workers with access to vulnerable beneficiary data have significant potential to cause harm); and inadequate offboarding (when volunteers or staff leave, their access is frequently not promptly revoked).

Managing Insider Access Risk in Charities

Practical insider access risk management for charities: implement a least-privilege access policy — volunteers and staff access only the data they need for their specific role; conduct access reviews quarterly — remove access for anyone who has left or changed role; promptly revoke access when staff or volunteers leave (ideally on the day they leave, before their departure is announced); require unique individual accounts — no shared logins for CRM or case management systems; enable audit logging so access to beneficiary and donor data is recorded; conduct DBS checks for volunteers and staff with access to the most sensitive beneficiary data; and include data protection obligations in volunteer agreements (not just staff contracts). These controls balance security with the practical reality of charity operations.

Kyanite Blue specialises in cybersecurity for iGaming operators. MGA-licensed operators across Malta trust our stack.

Get in touch

Ready to secure your iGaming operation?

MGA-licensed operators across Malta trust Kyanite Blue.