How to build in cybersecurity to all content creation activities
Protecting your members and organization from Phishing and Spear Phishing attacks
Protecting your forms from hackers & spammers
Protecting your blogs from spammers
How to find the latest cybersecurity tips
Built-in Cybersecurity
Built-in cybersecurity is the activity of thinking about and implementing cybersecurity techniques during the website content creation and editing process. Built-in cybersecurity is not considered an afterthought; it’s built in right from the beginning.
Do use contact forms with reCaptcha to communicate with the public.
Do train your site content creators on the cybersecurity Dos and Don’ts.
Do use reCaptcha on all blog posts that allow comments.
Protecting your members and organization from Phishing and Spear Phishing attacks
How do the hackers do it?
It’s incredibly simple for hackers to create a targeted Spear Phishing campaign that can cause personal, financial and brand damage to an organization, staff and its members.
There are several ways to Spear Phish, some of which are fairly complex but the easiest and most common way to Spear Phish a business or organization is as follows.
The hackers write a computer program that automatically searches the Internet for organization information stored in website HTML, Excel and PDF files. This information includes
Name
Email
Organization information
Role or title
Computer program extracts the data and stores it on the hacker’s computer.
A Spear Phishing email is created by the hacker that targets a specific group within an organization based on the mission of the organization.
The targeted Spear Phishing email is sent to all members in the target group, from what appears to be coming from a person belonging to the target group.
The Spear Phishing email provokes an emotional response, usually about a sick child that needs financial support for medical treatments.
The Spear Phishing email has links to a malicious website where the member interacts and gives up personal and financial information.
The hacker then monetizes the compromised member data either by selling it to other hackers or by using the data themselves to make purchases or to collect payments from the member’s bank account
Check out ThreatPost for the latest cyber threat news
Congratulations!
You have successfully completed this module. If you follow the guidelines in this module, you will be able to securely use your new club site. Great work!
The elves of the Kiwanis Club of Swoyersville, Pennsylvania, U.S., sent kids’ letters and postcards to Santa this holiday season — and made sure Santa replied to each one. #KidsNeedKiwanis... See MoreSee Less
Swoyersville Kiwanis have gotten Santa’s Express Mailbox ready to collect letters/post cards from children in all communities. All letters/cards will be sent to Santa to read. Then, a special…
Happy hundredth, Doug Butler! 🎉🎁🎂 The longtime Kiwanian celebrated his 100th birthday on Wednesday with fellow members of the Kiwanis Club of Winchester, Virginia, U.S. The Winchester Star was also there to relate some moments from the big event: bit.ly/4iHf16v
Congrats, Doug — and thanks for all your service! #KidsNeedKiwanis
Photo by Jeff Taylor of The Winchester Star ... See MoreSee Less
Module Zero – Site Security
Site Security
In this module we will cover:
Built-in Cybersecurity
Built-in cybersecurity is the activity of thinking about and implementing cybersecurity techniques during the website content creation and editing process. Built-in cybersecurity is not considered an afterthought; it’s built in right from the beginning.
Download our cybersecurity handbook here:
The Don’ts of Site Cybersecurity
The Dos of Site Cybersecurity
Protecting your members and organization from Phishing and Spear Phishing attacks
How do the hackers do it?
It’s incredibly simple for hackers to create a targeted Spear Phishing campaign that can cause personal, financial and brand damage to an organization, staff and its members.
There are several ways to Spear Phish, some of which are fairly complex but the easiest and most common way to Spear Phish a business or organization is as follows.
Example of a Real Spear Phishing Email
How to avoid being Spear Phished
How to stay updated on cyber threats
Congratulations!
You have successfully completed this module. If you follow the guidelines in this module, you will be able to securely use your new club site. Great work!
Training Calendar
Sorry, nothing found.Facebook Posts
The elves of the Kiwanis Club of Swoyersville, Pennsylvania, U.S., sent kids’ letters and postcards to Santa this holiday season — and made sure Santa replied to each one. #KidsNeedKiwanis ... See MoreSee Less
Swoyersville Kiwanis to help mail letters to Santa
www.citizensvoice.com
Swoyersville Kiwanis have gotten Santa’s Express Mailbox ready to collect letters/post cards from children in all communities. All letters/cards will be sent to Santa to read. Then, a special…1 CommentComment on Facebook
Happy hundredth, Doug Butler! 🎉🎁🎂 The longtime Kiwanian celebrated his 100th birthday on Wednesday with fellow members of the Kiwanis Club of Winchester, Virginia, U.S. The Winchester Star was also there to relate some moments from the big event: bit.ly/4iHf16v
Congrats, Doug — and thanks for all your service! #KidsNeedKiwanis
Photo by Jeff Taylor of The Winchester Star ... See MoreSee Less
22 CommentsComment on Facebook
Doug is also a 75-year member of Kiwanis! Earlier this year, he shared some reflections: kiwanis.org/doug-butler-marks-75-years-with-kiwanis/
Happy Birthday Doug! Thank you for your service to Kiwanis!
Happy Birthday, Doug!
View more comments