How to build in cybersecurity to all content creation activities
Protecting your members and organization from Phishing and Spear Phishing attacks
Protecting your forms from hackers & spammers
Protecting your blogs from spammers
How to find the latest cybersecurity tips
Built-in Cybersecurity
Built-in cybersecurity is the activity of thinking about and implementing cybersecurity techniques during the website content creation and editing process. Built-in cybersecurity is not considered an afterthought; it’s built in right from the beginning.
Do use contact forms with reCaptcha to communicate with the public.
Do train your site content creators on the cybersecurity Dos and Don’ts.
Do use reCaptcha on all blog posts that allow comments.
Protecting your members and organization from Phishing and Spear Phishing attacks
How do the hackers do it?
It’s incredibly simple for hackers to create a targeted Spear Phishing campaign that can cause personal, financial and brand damage to an organization, staff and its members.
There are several ways to Spear Phish, some of which are fairly complex but the easiest and most common way to Spear Phish a business or organization is as follows.
The hackers write a computer program that automatically searches the Internet for organization information stored in website HTML, Excel and PDF files. This information includes
Name
Email
Organization information
Role or title
Computer program extracts the data and stores it on the hacker’s computer.
A Spear Phishing email is created by the hacker that targets a specific group within an organization based on the mission of the organization.
The targeted Spear Phishing email is sent to all members in the target group, from what appears to be coming from a person belonging to the target group.
The Spear Phishing email provokes an emotional response, usually about a sick child that needs financial support for medical treatments.
The Spear Phishing email has links to a malicious website where the member interacts and gives up personal and financial information.
The hacker then monetizes the compromised member data either by selling it to other hackers or by using the data themselves to make purchases or to collect payments from the member’s bank account
Example of a Real Spear Phishing Email
Actual Spear Phishing attack that targeted Kiwanis members
Check out ThreatPost for the latest cyber threat news
Congratulations!
You have successfully completed this module. If you follow the guidelines in this module, you will be able to securely use your new club site. Great work!
Young singers, pianists and others lit up the stage at the Kiwanis Club of Cheyenne’s 71st Stars of Tomorrow talent competition in Wyoming, U.S. The winners’ schools receive a US$750 award for their art and music programs. Congratulations to all who participated! #KidsNeedKiwanis... See MoreSee Less
CHEYENNE, Wyo. — Three East High School students won the overall Best in Show award during the 71st annual Stars of Tomorrow competition presented by the
The Kiwanis Club of Bryan, Ohio, U.S., is funding the purchase of a book vending machine at Bryan Elementary School. Kids will earn tokens for books through good behavior — fostering both good citizenship and a love of reading. #KidsNeedKiwanis... See MoreSee Less
Module Zero – Site Security
Site Security
In this module we will cover:
Built-in Cybersecurity
Built-in cybersecurity is the activity of thinking about and implementing cybersecurity techniques during the website content creation and editing process. Built-in cybersecurity is not considered an afterthought; it’s built in right from the beginning.
Download our cybersecurity handbook here:
The Don’ts of Site Cybersecurity
The Dos of Site Cybersecurity
Protecting your members and organization from Phishing and Spear Phishing attacks
How do the hackers do it?
It’s incredibly simple for hackers to create a targeted Spear Phishing campaign that can cause personal, financial and brand damage to an organization, staff and its members.
There are several ways to Spear Phish, some of which are fairly complex but the easiest and most common way to Spear Phish a business or organization is as follows.
Example of a Real Spear Phishing Email
How to avoid being Spear Phished
How to stay updated on cyber threats
Congratulations!
You have successfully completed this module. If you follow the guidelines in this module, you will be able to securely use your new club site. Great work!
Training Calendar
Sorry, nothing found.Kiwanis International Posts
Young singers, pianists and others lit up the stage at the Kiwanis Club of Cheyenne’s 71st Stars of Tomorrow talent competition in Wyoming, U.S. The winners’ schools receive a US$750 award for their art and music programs. Congratulations to all who participated! #KidsNeedKiwanis ... See MoreSee Less
Cheyenne schools' arts, music programs benefit from student wins in Kiwanis Club's Stars of Tomorrow competition - Cheyenne, WY Cap City News
capcity.news
CHEYENNE, Wyo. — Three East High School students won the overall Best in Show award during the 71st annual Stars of Tomorrow competition presented by the1 CommentsComment on Facebook
The Kiwanis Club of Bryan, Ohio, U.S., is funding the purchase of a book vending machine at Bryan Elementary School. Kids will earn tokens for books through good behavior — fostering both good citizenship and a love of reading. #KidsNeedKiwanis ... See MoreSee Less
Kiwanis Club Makes Donation To Bryan Elementary School
thevillagereporter.com
Supporting Positive Behavior: Kiwanis Club of Bryan donates $6,000 check for Book Vending Machine at Bryan Elementary school.2 CommentsComment on Facebook