Enhanced Protection: Difference between revisions

From GCA ACT
Jump to navigationJump to search
No edit summary
No edit summary
Line 1: Line 1:
{| class="wikitable" style="border: none; background-color: white; text-align: center;"
{| class="wikitable" style="border: none; background-color: white; text-align: center;"
|-
|-
| style="vertical-align: middle; border: none; text-align: right;" | <div style="display: flex; align-items: center; justify-content: right;"><div style="font-weight:bold; font-size:smaller;">Know What You Have</div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[[File:know-what-you-have.png|frameless|75px|link=Know_What_You_Have]]</div><br><br>
| style="vertical-align: middle; border: none; text-align: center;" | <div style="display: flex; align-items: center; justify-content: right;"><div style="font-weight:bold; font-size:smaller;">Know What You Have<br><div style="font-size:smaller; text-align:left;">Create an inventory to know what you need<br>to protect and to identify your risks:
#Identify your devices and accounts.
#Identify your applications.
#Identify your risks.
</div></div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[[File:know-what-you-have.png|frameless|75px|link=Know_What_You_Have]]</div><br><br>
| rowspan="3" style="vertical-align: middle; border: none;" | [[File:Rhinos.png|frameless|225px|link=Basic_Protection]]
| rowspan="3" style="vertical-align: middle; border: none;" | [[File:Rhinos.png|frameless|225px|link=Basic_Protection]]
| style="vertical-align: middle; border: none; text-align: left;" | <div style="display: flex; flex-direction: row-reverse; align-items: center; justify-content: left;"><div style="position:relative; font-weight:bold; font-size:smaller;">Update Your Defenses</div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[[File:update-your-defenses.png|frameless|75px|link=Update_Your_Defenses]]</div><br><br>
| style="vertical-align: middle; border: none; text-align: center;" | <div style="display: flex; flex-direction: row-reverse; align-items: center; justify-content: left;"><div style="position:relative; font-weight:bold; font-size:smaller;">Update Your Defenses<br><div style="text-align:left; font-size:smaller;">Boost your digital immunity against threats such as<br>viruses by updating your systems regularly and securely:
#Update your devices and applications.
#Encrypt your data.
#Secure your websites.
</div></div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[[File:update-your-defenses.png|frameless|75px|link=Update_Your_Defenses]]</div><br><br>
|-
|-
| style="vertical-align: middle; border: none; text-align: right;" | <div style="display: flex; align-items: center; justify-content: flex-end;"><div style="position:relative; font-weight:bold; font-size:smaller;">Beyond Simple Passwords</div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[[File:beyond-simple-passwords.png|frameless|75px|link=Beyond_Simple_Passwords]]&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</div><br><br>
| style="vertical-align: middle; border: none; text-align: center;" | <div style="display: flex; align-items: center; justify-content: flex-end;"><div style="position:relative; font-weight:bold; font-size:smaller;">Beyond Simple Passwords<br><div style="text-align:left; font-size:smaller;">Step up your password game to<br>protect your devices and accounts:
#Use strong passwords.
#Setup 2FA.
#Manage your passwords.
</div></div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[[File:beyond-simple-passwords.png|frameless|75px|link=Beyond_Simple_Passwords]]&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</div><br><br>
| style="vertical-align: middle; border: none; text-align: left;" | <div style="display: flex; flex-direction: row-reverse; align-items: center; justify-content: left;"><div style="position:relative; font-weight:bold; font-size:smaller;">Prevent Phishing & Malware</div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[[File:prevent-phishing-malware.png|frameless|75px|link=Prevent_Phishing_&_Malware]]&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</div><br><br>
| style="vertical-align: middle; border: none; text-align: left;" | <div style="display: flex; flex-direction: row-reverse; align-items: center; justify-content: left;"><div style="position:relative; font-weight:bold; font-size:smaller;">Prevent Phishing & Malware</div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[[File:prevent-phishing-malware.png|frameless|75px|link=Prevent_Phishing_&_Malware]]&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</div><br><br>
|-
|-

Revision as of 22:28, 17 July 2023

Know What You Have
Create an inventory to know what you need
to protect and to identify your risks:
  1. Identify your devices and accounts.
  2. Identify your applications.
  3. Identify your risks.
     File:Know-what-you-have.png


Rhinos.png
Update Your Defenses
Boost your digital immunity against threats such as
viruses by updating your systems regularly and securely:
  1. Update your devices and applications.
  2. Encrypt your data.
  3. Secure your websites.
     File:Update-your-defenses.png


Beyond Simple Passwords
Step up your password game to
protect your devices and accounts:
  1. Use strong passwords.
  2. Setup 2FA.
  3. Manage your passwords.
     File:Beyond-simple-passwords.png             


Prevent Phishing & Malware
     File:Prevent-phishing-malware.png             


Backup & Recover
     File:Backup-recover.png
Protect Your Email & Reputation
     File:Protect-email-reputation.png