How to build in cybersecurity to all content creation activities
Protecting your members and organization from Phishing and Spear Phishing attacks
Protecting your forms from hackers & spammers
Protecting your blogs from spammers
How to find the latest cybersecurity tips
Built-in Cybersecurity
Built-in cybersecurity is the activity of thinking about and implementing cybersecurity techniques during the website content creation and editing process. Built-in cybersecurity is not considered an afterthought; it’s built in right from the beginning.
Do use contact forms with reCaptcha to communicate with the public.
Do train your site content creators on the cybersecurity Dos and Don’ts.
Do use reCaptcha on all blog posts that allow comments.
Protecting your members and organization from Phishing and Spear Phishing attacks
How do the hackers do it?
It’s incredibly simple for hackers to create a targeted Spear Phishing campaign that can cause personal, financial and brand damage to an organization, staff and its members.
There are several ways to Spear Phish, some of which are fairly complex but the easiest and most common way to Spear Phish a business or organization is as follows.
The hackers write a computer program that automatically searches the Internet for organization information stored in website HTML, Excel and PDF files. This information includes
Name
Email
Organization information
Role or title
Computer program extracts the data and stores it on the hacker’s computer.
A Spear Phishing email is created by the hacker that targets a specific group within an organization based on the mission of the organization.
The targeted Spear Phishing email is sent to all members in the target group, from what appears to be coming from a person belonging to the target group.
The Spear Phishing email provokes an emotional response, usually about a sick child that needs financial support for medical treatments.
The Spear Phishing email has links to a malicious website where the member interacts and gives up personal and financial information.
The hacker then monetizes the compromised member data either by selling it to other hackers or by using the data themselves to make purchases or to collect payments from the member’s bank account
Check out ThreatPost for the latest cyber threat news
Congratulations!
You have successfully completed this module. If you follow the guidelines in this module, you will be able to securely use your new club site. Great work!
Training Calendar
Sorry, nothing found.
Facebook Posts
This message is only visible to admins.
Problem displaying Facebook posts. Backup cache in use.
Error: (#200) Provide valid app ID Type: OAuthException
Module Zero – Site Security
Site Security
In this module we will cover:
Built-in Cybersecurity
Built-in cybersecurity is the activity of thinking about and implementing cybersecurity techniques during the website content creation and editing process. Built-in cybersecurity is not considered an afterthought; it’s built in right from the beginning.
Download our cybersecurity handbook here:
The Don’ts of Site Cybersecurity
The Dos of Site Cybersecurity
Protecting your members and organization from Phishing and Spear Phishing attacks
How do the hackers do it?
It’s incredibly simple for hackers to create a targeted Spear Phishing campaign that can cause personal, financial and brand damage to an organization, staff and its members.
There are several ways to Spear Phish, some of which are fairly complex but the easiest and most common way to Spear Phish a business or organization is as follows.
Example of a Real Spear Phishing Email
How to avoid being Spear Phished
How to stay updated on cyber threats
Congratulations!
You have successfully completed this module. If you follow the guidelines in this module, you will be able to securely use your new club site. Great work!
Training Calendar
Sorry, nothing found.Facebook Posts
Problem displaying Facebook posts. Backup cache in use.
Type: OAuthException