Almost half of UK charities for world’s poorest set to close in a year – survey | The Guardian

Demand for services overseas has risen during Covid-19 but lack of financial support will force 45% to shut their doorsNearly half of the UK’s small charities working with the world’s poorest people expect to close within the next 12 months due to lack of financial support, a survey has found.Despite most of them seeing a spike in demand for their services during Covid-19, 15% of the charities will be forced to shut their doors within the next six months, and 45% within a year, according to data from the Small International Development Charities Network (SIDCN). Continue reading…

Demand for services overseas has risen during Covid-19 but lack of financial support will force 45% to shut their doors

Nearly half of the UK’s small charities working with the world’s poorest people expect to close within the next 12 months due to lack of financial support, a survey has found.

Despite most of them seeing a spike in demand for their services during Covid-19, 15% of the charities will be forced to shut their doors within the next six months, and 45% within a year, according to data from the Small International Development Charities Network (SIDCN).

Continue reading…


Are you Citizen-Journalist Material?

Have a tip or scoop? Do you have info about corruption that needs to be investigated and responsibly exposed ? Get in touch securely via WhatsApp at +44 7771 927378 | Signal at +447766 098270


Receive Exclusives, Features & News Updates

Subscribe



What Are
Geo-Poli-
Cyber™ Risks?

What Is Geo-Poli-Cyber™?

MLi Group created the terms Poli-Cyber™ and Geo-Poli-Cyber™ (GPC™) in 2012 and 2013 based on the philosophy that if you cannot identify and name the threat, you cannot mitigate that threat.

Geo-Poli-Cyber™ attacks are political, ideological, terrorist, extremist, ‘religious’, and/or geo-politically motivated.

More Sinister Than Financial Motivations

Geo-Poli-Cyber™ attacks are significantly different from financially motivated cyber-attacks in damage, scale, magnitude as well as in risk mitigation strategies and solutions.

Click to read more