How to build in cybersecurity to all content creation activities
Protecting your members and organization from Phishing and Spear Phishing attacks
Protecting your forms from hackers & spammers
Protecting your blogs from spammers
How to find the latest cybersecurity tips
Built-in Cybersecurity
Built-in cybersecurity is the activity of thinking about and implementing cybersecurity techniques during the website content creation and editing process. Built-in cybersecurity is not considered an afterthought; it’s built in right from the beginning.
Do use contact forms with reCaptcha to communicate with the public.
Do train your site content creators on the cybersecurity Dos and Don’ts.
Do use reCaptcha on all blog posts that allow comments.
Protecting your members and organization from Phishing and Spear Phishing attacks
How do the hackers do it?
It’s incredibly simple for hackers to create a targeted Spear Phishing campaign that can cause personal, financial and brand damage to an organization, staff and its members.
There are several ways to Spear Phish, some of which are fairly complex but the easiest and most common way to Spear Phish a business or organization is as follows.
The hackers write a computer program that automatically searches the Internet for organization information stored in website HTML, Excel and PDF files. This information includes
Name
Email
Organization information
Role or title
Computer program extracts the data and stores it on the hacker’s computer.
A Spear Phishing email is created by the hacker that targets a specific group within an organization based on the mission of the organization.
The targeted Spear Phishing email is sent to all members in the target group, from what appears to be coming from a person belonging to the target group.
The Spear Phishing email provokes an emotional response, usually about a sick child that needs financial support for medical treatments.
The Spear Phishing email has links to a malicious website where the member interacts and gives up personal and financial information.
The hacker then monetizes the compromised member data either by selling it to other hackers or by using the data themselves to make purchases or to collect payments from the member’s bank account
Example of a Real Spear Phishing Email
Actual Spear Phishing attack that targeted Kiwanis members
Check out ThreatPost for the latest cyber threat news
Congratulations!
You have successfully completed this module. If you follow the guidelines in this module, you will be able to securely use your new club site. Great work!
The Kiwanis Club of Swift Current, Saskatchewan, Canada, has launched its Active Kids program to reduce financial barriers for involvement in youth sports. Community members can “adopt” an athlete, covering CA$400 in registration and equipment fees. #KidsNeedKiwanis... See MoreSee Less
The southwest welcomes a new initiative that's keen to ensure that local children from financially limited families have access to the same sports opportunities as others. The Kiwanis Active Kids prog...
After other funding fell through, the Kiwanis clubs of Ripon and Ripon Early Birds, Wisconsin, U.S., partnered with the local Rotary club to provide books to kids in the community through Dolly Parton’s Imagination Library. The clubs look forward to hosting a rare joint fundraising event for this new project. #KidsNeedKiwanis... See MoreSee Less
The Imagination Library will continue to provide books to children free of charge due to an agreement between Ripon service organizations and the Ripon Community Foundation.
Module Zero – Site Security
Site Security
In this module we will cover:
Built-in Cybersecurity
Built-in cybersecurity is the activity of thinking about and implementing cybersecurity techniques during the website content creation and editing process. Built-in cybersecurity is not considered an afterthought; it’s built in right from the beginning.
Download our cybersecurity handbook here:
The Don’ts of Site Cybersecurity
The Dos of Site Cybersecurity
Protecting your members and organization from Phishing and Spear Phishing attacks
How do the hackers do it?
It’s incredibly simple for hackers to create a targeted Spear Phishing campaign that can cause personal, financial and brand damage to an organization, staff and its members.
There are several ways to Spear Phish, some of which are fairly complex but the easiest and most common way to Spear Phish a business or organization is as follows.
Example of a Real Spear Phishing Email
How to avoid being Spear Phished
How to stay updated on cyber threats
Congratulations!
You have successfully completed this module. If you follow the guidelines in this module, you will be able to securely use your new club site. Great work!
Training Calendar
Sorry, nothing found.Kiwanis International Posts
The Kiwanis Club of Swift Current, Saskatchewan, Canada, has launched its Active Kids program to reduce financial barriers for involvement in youth sports. Community members can “adopt” an athlete, covering CA$400 in registration and equipment fees. #KidsNeedKiwanis ... See MoreSee Less
New program emerges to support local youth in sport
www.swiftcurrentonline.com
The southwest welcomes a new initiative that's keen to ensure that local children from financially limited families have access to the same sports opportunities as others. The Kiwanis Active Kids prog...2 CommentsComment on Facebook
After other funding fell through, the Kiwanis clubs of Ripon and Ripon Early Birds, Wisconsin, U.S., partnered with the local Rotary club to provide books to kids in the community through Dolly Parton’s Imagination Library. The clubs look forward to hosting a rare joint fundraising event for this new project. #KidsNeedKiwanis ... See MoreSee Less
Imagination Library finds new home thanks to service clubs
www.riponpress.com
The Imagination Library will continue to provide books to children free of charge due to an agreement between Ripon service organizations and the Ripon Community Foundation.3 CommentsComment on Facebook