Top Threats: Difference between revisions

From GCA ACT
Jump to navigationJump to search
(Created page with "Malicious software designed to infiltrate and damage computer systems. Phishing Attacks: Deceptive tactics used to trick users into revealing sensitive information. Ransomware: A type of malware that encrypts files and demands a ransom for their release. Data Breaches: Unauthorized access to sensitive data, resulting in potential identity theft and privacy breaches. Social Engineering: Manipulative techniques used to exploit human behavior and gain unauthorized acces...")
 
No edit summary
Line 1: Line 1:
{| class="wikitable" style="border: none; background-color: white; text-align: center;"
|-
| style="vertical-align: middle; border: none; text-align: right;" | <div style="display: flex; align-items: center; justify-content: right;"><div style="font-weight:bold; font-size:smaller;">Know What You Have</div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[[File:know-what-you-have.png|frameless|75px|Link=Know_What_You_Have]]</div><br><br>
| rowspan="3" style="vertical-align: middle; border: none;" | [[File:Rhinos.png|frameless|225px|link=Basic_Protection]]
| style="vertical-align: middle; border: none; text-align: left;" | <div style="display: flex; flex-direction: row-reverse; align-items: center; justify-content: left;"><div style="position:relative; font-weight:bold; font-size:smaller;">Update Your Defenses</div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[[File:update-your-defenses.png|frameless|75px|link=Update_Your_Defenses]]</div><br><br>
|-
| style="vertical-align: middle; border: none; text-align: right;" | <div style="display: flex; align-items: center; justify-content: flex-end;"><div style="position:relative; font-weight:bold; font-size:smaller;">Beyond Simple Passwords</div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[[File:beyond-simple-passwords.png|frameless|75px|link=Beyond_Simple_Passwords]]&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</div><br><br>
| style="vertical-align: middle; border: none; text-align: left;" | <div style="display: flex; flex-direction: row-reverse; align-items: center; justify-content: left;"><div style="position:relative; font-weight:bold; font-size:smaller;">Phishing & Malware</div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[[File:prevent-phishing-malware.png|frameless|75px|link=Phishing_Malware]]&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</div><br><br>
|-
| style="vertical-align: middle; border: none; text-align: right;" | <div style="display: flex; align-items: center; justify-content: flex-end;"><div style="position:relative; font-weight:bold; font-size:smaller;">Backup & Recover</div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[[File:backup-recover.png|frameless|75px|link=Backup_Recover]]</div>
| style="vertical-align: middle; border: none; text-align: left;" | <div style="display: flex; flex-direction: row-reverse; align-items: center; justify-content: left;"><div style="position:relative; font-weight:bold; font-size:smaller;">Email & Reputation</div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[[File:protect-email-reputation.png|frameless|75px|link=Email_Reputation]]</div>
|}
Malicious software designed to infiltrate and damage computer systems.
Malicious software designed to infiltrate and damage computer systems.



Revision as of 00:17, 15 July 2023

Know What You Have
     Link=Know_What_You_Have


Rhinos.png
Update Your Defenses
     File:Update-your-defenses.png


Beyond Simple Passwords
     File:Beyond-simple-passwords.png             


Phishing & Malware
     File:Prevent-phishing-malware.png             


Backup & Recover
     File:Backup-recover.png
Email & Reputation
     File:Protect-email-reputation.png

Malicious software designed to infiltrate and damage computer systems.

Phishing Attacks: Deceptive tactics used to trick users into revealing sensitive information.

Ransomware: A type of malware that encrypts files and demands a ransom for their release.

Data Breaches: Unauthorized access to sensitive data, resulting in potential identity theft and privacy breaches.

Social Engineering: Manipulative techniques used to exploit human behavior and gain unauthorized access to systems.