{"id":29234,"date":"2024-11-13T12:54:29","date_gmt":"2024-11-13T17:54:29","guid":{"rendered":"https:\/\/knowledgeflow.org\/?p=29234"},"modified":"2024-12-19T12:20:05","modified_gmt":"2024-12-19T17:20:05","slug":"cybersecurity-for-nonprofits","status":"publish","type":"post","link":"https:\/\/knowledgeflow.org\/zh\/cybersecurity-for-nonprofits\/","title":{"rendered":"\u9488\u5bf9\u975e\u8425\u5229\u7ec4\u7ec7\u7684 5 \u4e2a\u7b80\u5355\u514d\u8d39\u7684\u7f51\u7edc\u5b89\u5168\u63d0\u793a"},"content":{"rendered":"<h3 class=\"wp-block-heading\">\u8ba4\u4e3a\u81ea\u5df1\u592a\u5c0f\u800c\u4e0d\u4f1a\u88ab\u9ed1\u5ba2\u653b\u51fb\uff1f\u9ed1\u5ba2\u53ef\u4e0d\u8fd9\u4e48\u8ba4\u4e3a\uff01\u975e\u8425\u5229\u7ec4\u7ec7\u548c\u793e\u533a\u670d\u52a1\u7ec4\u7ec7\u662f\u7f51\u7edc\u72af\u7f6a\u5206\u5b50\u5bb9\u6613\u5f97\u624b\u7684\u76ee\u6807\u3002<\/h3>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/11\/cybersecurity-for-nonprofits-1024x538.png\" alt=\"\u975e\u8425\u5229\u7ec4\u7ec7\u7684\u7f51\u7edc\u5b89\u5168--\u4e00\u7fa4\u4eba\u5728\u8ba8\u8bba\" class=\"wp-image-29247\" style=\"width:756px;height:auto\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/11\/cybersecurity-for-nonprofits-1024x538.png 1024w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/11\/cybersecurity-for-nonprofits-600x315.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/11\/cybersecurity-for-nonprofits-300x158.png 300w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/11\/cybersecurity-for-nonprofits-768x403.png 768w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/11\/cybersecurity-for-nonprofits-18x9.png 18w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/11\/cybersecurity-for-nonprofits.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>\u975e\u8425\u5229\u7ec4\u7ec7\u7684\u7f51\u7edc\u5b89\u5168\uff1a\u7f51\u7edc\u72af\u7f6a\u5206\u5b50\u4e0d\u4e00\u5b9a\u4e13\u95e8\u9488\u5bf9\u975e\u8425\u5229\u7ec4\u7ec7\uff0c\u4f46\u4f1a\u5bfb\u627e\u8584\u5f31\u70b9\uff0c\u800c\u975e\u8425\u5229\u7ec4\u7ec7\u7531\u4e8e\u7f51\u7edc\u5b89\u5168\u8d44\u6e90\u6709\u9650\uff0c\u5f80\u5f80\u4f1a\u51fa\u73b0\u8fd9\u4e9b\u6f0f\u6d1e\u3002\u793e\u533a\u7ec4\u7ec7\u5904\u7406\u654f\u611f\u6570\u636e\uff0c\u5305\u62ec\u6350\u8d60\u8005\u4fe1\u606f\u3001\u4f1a\u5458\u8bb0\u5f55\u548c\u8d22\u52a1\u7ec6\u8282\uff0c\u6240\u6709\u8fd9\u4e9b\u5bf9\u653b\u51fb\u8005\u6765\u8bf4\u90fd\u5f88\u6709\u4ef7\u503c\u3002\u7f3a\u4e4f\u7ecf\u9a8c\u7684\u5458\u5de5\u548c\u5fd7\u613f\u8005\u5f88\u5bb9\u6613\u53d7\u5230\u7f51\u7edc\u9493\u9c7c\u7684\u653b\u51fb\uff0c\u5728\u5c0f\u578b\u7ec4\u7ec7\u53d7\u5230\u7684\u7f51\u7edc\u653b\u51fb\u4e2d\uff0c\u7f51\u7edc\u9493\u9c7c\u5360 41%\uff0c\u901a\u5e38\u4f1a\u5bfc\u81f4\u91cd\u5927\u635f\u5931\u3002\u4ee5\u4e0b\u662f\u60a8\u73b0\u5728\u5c31\u53ef\u4ee5\u91c7\u53d6\u7684 5 \u4e2a\u7b80\u5355\u3001\u514d\u8d39\u7684\u6b65\u9aa4\uff0c\u4ee5\u52a0\u5f3a\u975e\u8425\u5229\u7ec4\u7ec7\u7684\u7f51\u7edc\u5b89\u5168\uff1a<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>\u786e\u4fdd\u8d26\u6237\u5b89\u5168<\/strong>\n<ul class=\"wp-block-list\">\n<li><strong>\u4e3a\u4ec0\u4e48<\/strong>:\u8584\u5f31\u6216\u91cd\u590d\u7684\u5bc6\u7801\u5f88\u5bb9\u6613\u88ab\u653b\u51fb\u8005\u5229\u7528\u3002\u4e3a\u6bcf\u4e2a\u8d26\u6237\u4f7f\u7528\u552f\u4e00\u7684\u5bc6\u7801\uff0c\u5207\u52ff\u91cd\u590d\u4f7f\u7528\u3002\u4f7f\u7528 <a href=\"https:\/\/knowledgeflow.org\/resource\/password-managers-things-to-consider\/\">\u5bc6\u7801\u7ba1\u7406\u5668 <\/a>\u5e2e\u52a9\u60a8\u751f\u6210\u5e76\u5b89\u5168\u5730\u5b58\u50a8\u5f3a\u5927\u7684\u5bc6\u7801\u3002\u542f\u7528 <a href=\"https:\/\/knowledgeflow.org\/resource\/two-factor-authentication\/\">\u53cc\u56e0\u7d20\u8ba4\u8bc1<\/a> \u53ea\u8981\u6709\u53ef\u80fd\u3002<\/li>\n\n\n\n<li><strong>\u9ed1\u5ba2\u5982\u4f55\u5229\u7528\u8fd9\u4e00\u70b9<\/strong>:\u7f51\u7edc\u72af\u7f6a\u5206\u5b50\u4f7f\u7528\u66b4\u529b\u653b\u51fb\u548c <a href=\"https:\/\/knowledgeflow.org\/resource\/credential-stuffing-unique-password\/\">\u8bc1\u4ef6\u586b\u5145<\/a> (\u5728\u8fd9\u79cd\u60c5\u51b5\u4e0b\uff0c\u88ab\u7834\u89e3\u7684\u51ed\u636e\u4f1a\u5728\u591a\u4e2a\u8d26\u6237\u4e2d\u8fdb\u884c\u6d4b\u8bd5\uff09\u6765\u5165\u4fb5\u3001\u7a83\u53d6\u6570\u636e\u6216\u9501\u5b9a\u4f60\u3002<br><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>\u786e\u4fdd\u60a8\u7684 <\/strong><a href=\"https:\/\/knowledgeflow.org\/resource\/creating-a-guest-wi-fi-network\/\">\u8def\u7531\u5668\/Wi-Fi \u5b89\u5168\u52a0\u5bc6<\/a>\n<ul class=\"wp-block-list\">\n<li><strong>\u4e3a\u4ec0\u4e48<\/strong>:\u672a\u52a0\u5bc6\u7684 Wi-Fi \u5141\u8bb8\u653b\u51fb\u8005\u62e6\u622a\u901a\u8fc7\u7f51\u7edc\u7684\u6570\u636e\u6d41\u91cf\uff0c\u83b7\u53d6\u5bc6\u7801\u548c\u8d22\u52a1\u4fe1\u606f\u7b49\u654f\u611f\u4fe1\u606f\u3002<\/li>\n\n\n\n<li><strong>\u9ed1\u5ba2\u5982\u4f55\u5229\u7528\u8fd9\u4e00\u70b9<\/strong>:\u9ed1\u5ba2\u53ef\u4ee5\u6267\u884c <strong>\u4e2d\u95f4\u4eba\uff08MitM\uff09\u653b\u51fb<\/strong> \u5728\u4e0d\u5b89\u5168\u6216\u4fdd\u62a4\u4e0d\u529b\u7684 Wi-Fi \u4e0a\uff0c\u5b83\u4eec\u4f1a\u62e6\u622a\u4f60\u7684\u8bbe\u5907\u4e0e\u4e92\u8054\u7f51\u4e4b\u95f4\u7684\u901a\u4fe1\u3002\u8fd9\u6837\uff0c\u5b83\u4eec\u5c31\u80fd\u7a83\u53d6\u767b\u5f55\u51ed\u8bc1\u3001\u76d1\u63a7\u60a8\u7684\u6d3b\u52a8\u6216\u5411\u60a8\u7684\u7f51\u7edc\u6ce8\u5165\u6076\u610f\u8f6f\u4ef6\u3002<br><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>\u4e0d\u65ad\u66f4\u65b0\u8f6f\u4ef6\u548c\u8bbe\u5907<\/strong>\n<ul class=\"wp-block-list\">\n<li><strong>\u4e3a\u4ec0\u4e48<\/strong>:\u8fc7\u65f6\u7684\u8f6f\u4ef6\u5b58\u5728\u653b\u51fb\u8005\u53ef\u5229\u7528\u7684\u6f0f\u6d1e\u3002<\/li>\n\n\n\n<li><strong>\u9ed1\u5ba2\u5982\u4f55\u5229\u7528\u8fd9\u4e00\u70b9<\/strong>:\u653b\u51fb\u8005\u5229\u7528 <strong>\u672a\u6253\u8865\u4e01\u7684\u8f6f\u4ef6<\/strong>.\u5b83\u4eec\u5229\u7528\u8fc7\u65f6\u8f6f\u4ef6\u4e2d\u7684\u5df2\u77e5\u6f0f\u6d1e\u5165\u4fb5\u7cfb\u7edf\u3001\u5b89\u88c5\u6076\u610f\u8f6f\u4ef6\u6216\u7a83\u53d6\u6570\u636e\u3002\u4f8b\u5982\uff0c\u52d2\u7d22\u8f6f\u4ef6\u901a\u5e38\u662f\u901a\u8fc7\u672a\u6253\u8865\u4e01\u8f6f\u4ef6\u4e2d\u7684\u6f0f\u6d1e\u90e8\u7f72\u7684\u3002<br><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>\u5b9a\u671f\u5907\u4efd\u6570\u636e<\/strong>\n<ul class=\"wp-block-list\">\n<li><strong>\u4e3a\u4ec0\u4e48<\/strong>:\u5728\u51fa\u73b0\u52d2\u7d22\u8f6f\u4ef6\u6216\u7cfb\u7edf\u6545\u969c\u65f6\uff0c\u5907\u4efd\u53ef\u8ba9\u60a8\u5728\u4e0d\u652f\u4ed8\u8d4e\u91d1\u6216\u4e0d\u4e22\u5931\u4e00\u5207\u7684\u60c5\u51b5\u4e0b\u6062\u590d\u6570\u636e\u3002<\/li>\n\n\n\n<li><strong>\u9ed1\u5ba2\u5982\u4f55\u5229\u7528\u8fd9\u4e00\u70b9<\/strong>:\u9ed1\u5ba2\u4f7f\u7528 <strong>\u52d2\u7d22\u8f6f\u4ef6<\/strong> \u5b83\u4eec\u4f1a\u52a0\u5bc6\u4f60\u7684\u6570\u636e\uff0c\u5c06\u4f60\u9501\u5b9a\uff0c\u5e76\u8981\u6c42\u4f60\u652f\u4ed8\u8d4e\u91d1\u624d\u80fd\u6062\u590d\u8bbf\u95ee\u3002\u5982\u679c\u6ca1\u6709\u5907\u4efd\uff0c\u4f01\u4e1a\u5f80\u5f80\u88ab\u8feb\u652f\u4ed8\u8d4e\u91d1\u3002\u5b9a\u671f\u5907\u4efd\u53ef\u786e\u4fdd\u60a8\u5728\u4e0d\u5c48\u670d\u4e8e\u653b\u51fb\u8005\u8981\u6c42\u7684\u60c5\u51b5\u4e0b\u6062\u590d\u6570\u636e\u3002\u60a8\u8fd8\u53ef\u4ee5\u4f7f\u7528\u514d\u8d39\u7684\u52d2\u7d22\u8f6f\u4ef6\u4fdd\u62a4\u8f6f\u4ef6\uff0c\u5982 <strong>\u6076\u610f\u8f6f\u4ef6<\/strong> \u6216 <strong>\u6bd4\u7279\u68b5\u5fb7\u53cd\u52d2\u7d22\u8f6f\u4ef6<\/strong> \u4ee5\u5e2e\u52a9\u5728\u52d2\u7d22\u8f6f\u4ef6\u52a0\u5bc6\u4f60\u7684\u6587\u4ef6\u524d\u68c0\u6d4b\u5e76\u963b\u6b62\u5b83\u3002<br><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>\u57f9\u8bad\u5458\u5de5\u548c\u5fd7\u613f\u8005\u8bc6\u522b\u7f51\u7edc\u9493\u9c7c<\/strong>\n<ul class=\"wp-block-list\">\n<li><strong>\u4e3a\u4ec0\u4e48<\/strong>: <a href=\"https:\/\/knowledgeflow.org\/resource\/scammer-trick-phishing\/\">\u7f51\u7edc\u9493\u9c7c\u6b3a\u8bc8<\/a> \u8bf1\u9a97\u7528\u6237\u70b9\u51fb\u6076\u610f\u94fe\u63a5\u3001\u5171\u4eab\u654f\u611f\u4fe1\u606f\u6216\u5b8c\u6210\u6b3a\u8bc8\u6027\u4ea4\u6613\u3002<\/li>\n\n\n\n<li><strong>\u9ed1\u5ba2\u5982\u4f55\u5229\u7528\u8fd9\u4e00\u70b9<\/strong>:\u7f51\u7edc\u9493\u9c7c\u7535\u5b50\u90ae\u4ef6\u770b\u4f3c\u5408\u6cd5\uff0c\u5374\u5e26\u6709\u6709\u5bb3\u94fe\u63a5\u6216\u9644\u4ef6\u3002\u70b9\u51fb\u5b83\u4eec\u53ef\u80fd\u5bfc\u81f4\u6570\u636e\u88ab\u76d7\u6216\u5b89\u88c5\u6076\u610f\u8f6f\u4ef6\u3002\u7f51\u7edc\u9493\u9c7c\u662f\u653b\u51fb\u8005\u7ed5\u8fc7\u5f3a\u5927\u5b89\u5168\u63aa\u65bd\u7684\u6700\u7b80\u5355\u65b9\u6cd5\u4e4b\u4e00\uff0c\u56e0\u4e3a\u5b83\u5229\u7528\u4e86\u4eba\u4e3a\u9519\u8bef\u3002\u6211\u4eec\u7684 <a href=\"https:\/\/mailchi.mp\/knowledgeflow.org\/knowledgenet-phishing-signup\">\u514d\u8d39\u7f51\u7edc\u9493\u9c7c\u8bc6\u522b\u8bfe\u7a0b<\/a> \u6559\u4f60\u5982\u4f55\u8bc6\u522b\u548c\u907f\u514d\u8fd9\u4e9b\u9a97\u5c40\u3002 <\/li>\n<\/ul>\n<\/li>\n<\/ol>\n\n\n\n<p><strong>\u5956\u52b1\u63d0\u793a #6<\/strong>:\u5982\u679c\u60a8\u7684\u7ec4\u7ec7\u652f\u6301\u8fb9\u7f18\u5316\u7fa4\u4f53\uff0c\u5219\u53ef\u80fd\u6210\u4e3a\u5de8\u9b54\u548c\u9ed1\u5ba2\u7684\u653b\u51fb\u76ee\u6807\u3002 <strong>\u62a5\u540d\u53c2\u52a0\u6211\u4eec\u7684\u514d\u8d39 <a href=\"https:\/\/knowledgeflow.org\/initiative\/cybershield-course-nonprofits\/\">\u7f51\u7edc\u76fe\u724c\u8bfe\u7a0b<\/a><\/strong> \u62b5\u5fa1\u7f51\u7edc\u9a9a\u6270\u548c\u4ec7\u6068\u3002<\/p>\n\n\n\n<p>\u6709\u5173\u975e\u8425\u5229\u7ec4\u7ec7\u7f51\u7edc\u5b89\u5168\u7684\u66f4\u591a\u8d44\u6e90\uff0c\u8bf7\u67e5\u770b\u6211\u4eec\u901a\u8fc7\u7535\u5b50\u90ae\u4ef6\u63d0\u4f9b\u7684\u514d\u8d39\u4e92\u52a8\u8bfe\u7a0b\uff0c\u8be5\u8bfe\u7a0b\u4e13\u95e8\u4ecb\u7ecd\u5982\u4f55\u8bc6\u522b\u7f51\u7edc\u9493\u9c7c\u3001 <a href=\"https:\/\/mailchi.mp\/knowledgeflow.org\/knowledgenet-phishing-signup\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>\u5728\u6b64\u6ce8\u518c<\/strong><\/a>.\u6211\u4eec\u8fd8\u6709 <strong>\u6240\u6709\u5e74\u9f84\u6bb5\u7684\u514d\u8d39\u7f51\u7edc\u5b89\u5168\u610f\u8bc6\u8bfe\u7a0b\u53ef\u4ece\u4ee5\u4e0b\u7f51\u7ad9\u83b7\u53d6 <a href=\"https:\/\/cybersafetyacademy.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u7f51\u7edc\u5b89\u5168\u5b66\u9662\u7f51\u7ad9<\/a><\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\u4e0d\u8981\u7b49\u5230\u60a8\u7684\u975e\u8425\u5229\u7ec4\u7ec7\u53d1\u5c55\u58ee\u5927\u540e\u624d\u8003\u8651\u7f51\u7edc\u5b89\u5168\u95ee\u9898\uff0c\u56e0\u4e3a\u9ed1\u5ba2\u4e0d\u4f1a\u5750\u4ee5\u5f85\u6bd9\u3002<\/h2>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>\u975e\u8425\u5229\u7ec4\u7ec7\u662f\u7f51\u7edc\u72af\u7f6a\u5206\u5b50\u7684\u4e3b\u8981\u76ee\u6807\u3002\u4f7f\u7528\u4ee5\u4e0b 5 \u4e2a\u7b80\u5355\u7684\u7f51\u7edc\u5b89\u5168\u63d0\u793a\u6765\u5e2e\u52a9\u4fdd\u62a4\u60a8\u7684\u4fe1\u606f\u3002 <\/p>","protected":false},"author":8,"featured_media":29282,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[516],"tags":[],"class_list":["post-29234","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-knowledgebytes"],"acf":[],"taxonomy_info":{"category":[{"value":516,"label":"KnowledgeBytes"}]},"featured_image_src_large":["https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/11\/cybersecurity-for-nonprofits-3-1024x538.png",1024,538,true],"author_info":{"display_name":"KnowledgeFlow Cybersafety Foundation","author_link":"https:\/\/knowledgeflow.org\/zh\/author\/knowledgefloweditor\/"},"comment_info":0,"category_info":[{"term_id":516,"name":"KnowledgeBytes","slug":"knowledgebytes","term_group":0,"term_taxonomy_id":516,"taxonomy":"category","description":"","parent":0,"count":79,"filter":"raw","cat_ID":516,"category_count":79,"category_description":"","cat_name":"KnowledgeBytes","category_nicename":"knowledgebytes","category_parent":0}],"tag_info":false,"_links":{"self":[{"href":"https:\/\/knowledgeflow.org\/zh\/wp-json\/wp\/v2\/posts\/29234","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/knowledgeflow.org\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/knowledgeflow.org\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/zh\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/zh\/wp-json\/wp\/v2\/comments?post=29234"}],"version-history":[{"count":5,"href":"https:\/\/knowledgeflow.org\/zh\/wp-json\/wp\/v2\/posts\/29234\/revisions"}],"predecessor-version":[{"id":29301,"href":"https:\/\/knowledgeflow.org\/zh\/wp-json\/wp\/v2\/posts\/29234\/revisions\/29301"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/zh\/wp-json\/wp\/v2\/media\/29282"}],"wp:attachment":[{"href":"https:\/\/knowledgeflow.org\/zh\/wp-json\/wp\/v2\/media?parent=29234"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/knowledgeflow.org\/zh\/wp-json\/wp\/v2\/categories?post=29234"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/knowledgeflow.org\/zh\/wp-json\/wp\/v2\/tags?post=29234"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}