How to build in cybersecurity to all content creation activities
Protecting your members and organization from Phishing and Spear Phishing attacks
Protecting your forms from hackers & spammers
Protecting your blogs from spammers
How to find the latest cybersecurity tips
Built-in Cybersecurity
Built-in cybersecurity is the activity of thinking about and implementing cybersecurity techniques during the website content creation and editing process. Built-in cybersecurity is not considered an afterthought; it’s built in right from the beginning.
Do use contact forms with reCaptcha to communicate with the public.
Do train your site content creators on the cybersecurity Dos and Don’ts.
Do use reCaptcha on all blog posts that allow comments.
Protecting your members and organization from Phishing and Spear Phishing attacks
How do the hackers do it?
It’s incredibly simple for hackers to create a targeted Spear Phishing campaign that can cause personal, financial and brand damage to an organization, staff and its members.
There are several ways to Spear Phish, some of which are fairly complex but the easiest and most common way to Spear Phish a business or organization is as follows.
The hackers write a computer program that automatically searches the Internet for organization information stored in website HTML, Excel and PDF files. This information includes
Name
Email
Organization information
Role or title
Computer program extracts the data and stores it on the hacker’s computer.
A Spear Phishing email is created by the hacker that targets a specific group within an organization based on the mission of the organization.
The targeted Spear Phishing email is sent to all members in the target group, from what appears to be coming from a person belonging to the target group.
The Spear Phishing email provokes an emotional response, usually about a sick child that needs financial support for medical treatments.
The Spear Phishing email has links to a malicious website where the member interacts and gives up personal and financial information.
The hacker then monetizes the compromised member data either by selling it to other hackers or by using the data themselves to make purchases or to collect payments from the member’s bank account
Example of a Real Spear Phishing Email
Actual Spear Phishing attack that targeted Kiwanis members
Check out ThreatPost for the latest cyber threat news
Congratulations!
You have successfully completed this module. If you follow the guidelines in this module, you will be able to securely use your new club site. Great work!
Members of the Kiwanis Aktion Club of Anacortes, Washington, U.S., are leading the new Anacortes Able Housing Initiative, a nonprofit that will help secure affordable and accessible housing for adults with intellectual and developmental disabilities. ... See MoreSee Less
A small group of Anacortes families and caregivers of adults with intellectual and developmental disabilities (IDD) are banding together in an effort to secure their loved one’s futures.
When you give on #KiwanisDayofGiving February 25-26, you will help the Kiwanis Children's Fund spread the love of reading in local communities. For example, last year, the Kiwanis Club of Cicero, Indiana, U.S., received a Children’s Fund grant that helped them bring free books to school book fairs! 📚📖 #KidsNeedKiwanis
Module Zero – Site Security
Site Security
In this module we will cover:
Built-in Cybersecurity
Built-in cybersecurity is the activity of thinking about and implementing cybersecurity techniques during the website content creation and editing process. Built-in cybersecurity is not considered an afterthought; it’s built in right from the beginning.
Download our cybersecurity handbook here:
The Don’ts of Site Cybersecurity
The Dos of Site Cybersecurity
Protecting your members and organization from Phishing and Spear Phishing attacks
How do the hackers do it?
It’s incredibly simple for hackers to create a targeted Spear Phishing campaign that can cause personal, financial and brand damage to an organization, staff and its members.
There are several ways to Spear Phish, some of which are fairly complex but the easiest and most common way to Spear Phish a business or organization is as follows.
Example of a Real Spear Phishing Email
How to avoid being Spear Phished
How to stay updated on cyber threats
Congratulations!
You have successfully completed this module. If you follow the guidelines in this module, you will be able to securely use your new club site. Great work!
Training Calendar
Sorry, nothing found.Facebook Posts
Members of the Kiwanis Aktion Club of Anacortes, Washington, U.S., are leading the new Anacortes Able Housing Initiative, a nonprofit that will help secure affordable and accessible housing for adults with intellectual and developmental disabilities. ... See MoreSee Less
New nonprofit confronts looming disabled housing crisis
www.goskagit.com
A small group of Anacortes families and caregivers of adults with intellectual and developmental disabilities (IDD) are banding together in an effort to secure their loved one’s futures.1 CommentComment on Facebook
When you give on #KiwanisDayofGiving February 25-26, you will help the Kiwanis Children's Fund spread the love of reading in local communities. For example, last year, the Kiwanis Club of Cicero, Indiana, U.S., received a Children’s Fund grant that helped them bring free books to school book fairs! 📚📖 #KidsNeedKiwanis
kiwanis.org/dayofgiving ... See MoreSee Less
2 CommentsComment on Facebook
Please help us with food support monthly