Opinion

Cybersecurity in Social Entities: how to prevent scams and phishing

Image
Captura de pantalla 2025-11-10 105218.png
Source: Pexels.

Given that social entities are increasingly vulnerable to digital scams such as Phishing , this article explains the most common types of attacks and offers recommendations to improve digital security.

Captura de pantalla 2025-11-10 104437.png

Coordinator of the Digital Transformation Assistance Program for social entities. 

Social entities are particularly vulnerable to cyberattacks for several reasons. They often have a decentralized structure and the digital culture of their members is limited. In addition, many of them have limited technological resources, which makes them easy targets for cybercriminals.

Added to this is the trust that these organizations generate in the community, an aspect that, in some cases, can be used to take advantage of the good faith of their members. Digital scams, especially those involving Phishing attempts , have increased considerably in recent years. These attacks put at risk not only personal and financial data, but also the operations of social entities, affecting their sustainability and viability in the short, medium and long term.

Most common types of scams
Among the most common digital scams that affect social entities, one of the most widespread is Phishing . This type of attack is based on sending fake emails or messages that appear to be from legitimate sources, with the aim of stealing access credentials. A typical example would be an email that pretends to be from Social Security and requests banking details.

Another common practice is supplier spoofing , where attackers pose as regular suppliers and capture and modify bank details so that payments are sent to a fraudulent account. For example, an email may inform the entity that one of its suppliers has changed bank accounts and that future transfers should be made to a new IBAN.

Also very common is the president scam , in which an attacker poses as a bank executive and requests urgent transfers. This is often done through fake emails signed by the bank's president, indicating that an immediate payment is required for some emergency.

Finally, scams involving Malware attachments are becoming increasingly common. These are files attached to emails, such as PDF documents or other types of files, which, when opened, infect the entity's computer systems with viruses or other types of malicious software.

Origin of the problems
There are several factors that contribute to the vulnerability of social entities to cyberattacks. First, the low digital training of staff , especially among volunteers and administrative members and even by the entity's management, means that they do not have the tools or knowledge necessary to detect cyberthreats. This is exacerbated by the use of non-corporate emails such as Gmail, Yahoo or Outlook for internal communication, which makes it easier for attackers to pretend to be members of the entity.

In addition, many entities do not have internal protocols for verifying important changes and operations such as bank transfers or modifications to supplier data, which increases the risk of security incidents.

Finally, outdated or poorly protected technological infrastructure is another factor that increases vulnerability, since many of the systems used do not have the necessary updates or security protections.

Practical recommendations
In order to address these vulnerabilities, it is essential that social entities adopt a series of practices and recommendations.

First, ongoing training is crucial. Regular sessions should be organized for all staff, where good practices in Cybersecurity are explained and support resources are provided to ensure that all members of the entity are up to date.

Another important measure is two-step verification . Enabling multi-factor authentication on the platforms you use, such as email accounts and other digital tools, is an effective way to increase security. This is already applied in many sectors, such as banking, and is a practice that can prevent a large number of attacks.

Additionally, entities should establish clear internal protocols , such as specific rules for verifying bank account changes, transfers, and other sensitive communications. These protocols should define the steps to follow in any situation of significant change or communication and should be updated regularly to ensure they are up to date with the latest security practices.

It is also important that entities use corporate domains and avoid using personal emails for the management of institutional tasks. This helps reduce the risk that attackers use personal emails to infiltrate the entity's official communication. Another useful measure would be to carry out Phishing simulations to identify human vulnerabilities in staff and improve the response to future attacks.

In addition, it is necessary to keep systems constantly updated . Devices and programs must have the latest security versions available to prevent attackers from taking advantage of old vulnerabilities.

Finally, it is necessary to have adequate resources (human, technical and financial), with the corresponding profiles based on knowledge and experience in the comprehensive management of security applied in social entities.

Conclusions and final message
Despite the limited resources with which many social entities work, Cybersecurity cannot be relegated to the background. The digital threat landscape is evolving rapidly and constantly, with the fraudulent use of artificial intelligence and new hybrid techniques such as Quishing , Vishing or Spear Phishing . This implies that social entities must be proactive and flexible, adopting a rigorous and collective approach to their internal management and the use of their digital resources.

Therefore, it is essential that social entities prioritize a culture of prevention , ongoing training and compliance with regulations as strategic pillars in their daily operations. Simple actions such as reviewing passwords, updating backups and participating in regular training can prevent security incidents that have serious and irreversible consequences for the entity.

Investing in Cybersecurity is a way to protect people, the social impact and the sustainability of these organizations in the short, medium and long term. Implementing appropriate security policies and plans is an investment with high added value for the viability, sustainability and future of social entities. Collaboration between entities, administration and Cybersecurity experts is essential to guarantee a safe, inclusive and sustainable digitalization for all.

Add new comment

The content of this field is kept private and will not be shown publicly.