Enhanced Protection: Difference between revisions

From GCA ACT
Jump to navigationJump to search
No edit summary
No edit summary
Line 29: Line 29:
#Encrypt your backups.
#Encrypt your backups.
</div></div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[[File:backup-recover.png|frameless|75px|link=Backup_Recover]]</div>
</div></div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[[File:backup-recover.png|frameless|75px|link=Backup_Recover]]</div>
| style="vertical-align: middle; border: none; text-align: left;" | <div style="display: flex; flex-direction: row-reverse; align-items: center; justify-content: left;"><div style="position:relative; font-weight:bold; font-size:smaller;">Protect Your Email & Reputation</div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[[File:protect-email-reputation.png|frameless|75px|link=Protect_Your_Email_&_Reputation]]</div>
| style="vertical-align: middle; border: none; text-align: left;" | <div style="display: flex; flex-direction: row-reverse; align-items: center; justify-content: left;"><div style="position:relative; font-weight:bold; font-size:smaller;">Protect Your Email & Reputation<br><div style="text-align:left; font-size:smaller;">Protect your reputation and secure your<br>e-mail against those who mean you harm:
#Setup junk mail filtering.
#Protect your social media accounts.
#Consider identity, credit, and title monitoring.
</div></div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[[File:protect-email-reputation.png|frameless|75px|link=Protect_Your_Email_&_Reputation]]</div>
|}
|}

Revision as of 22:55, 17 July 2023

Know What You Have
Create an inventory to know what you need
to protect and to identify your risks:
  1. Identify your devices and accounts.
  2. Identify your applications.
  3. Identify your risks.
     File:Know-what-you-have.png


Rhinos.png
Update Your Defenses
Boost your digital immunity against threats such as
viruses by updating your systems regularly and securely:
  1. Update your devices and applications.
  2. Encrypt your data.
  3. Secure your websites.
     File:Update-your-defenses.png


Beyond Simple Passwords
Step up your password game to
protect your devices and accounts:
  1. Use strong passwords.
  2. Setup 2FA.
  3. Manage your passwords.
     File:Beyond-simple-passwords.png             


Prevent Phishing & Malware
Stop malware and phishing attacks in their tracks
to avoid loss of funds and data, expensive
recovery costs, and damage to your reputation:
  1. Install Anti-Virus Software.
  2. Install an Ad Blocker.
  3. Use DNS Security.
     File:Prevent-phishing-malware.png             


Backup & Recover
Just say no to Ransomware gangs and scammers
that lock your data and demand payment:
  1. Setup backups for your important data.
  2. Learn how to restore your data.
  3. Encrypt your backups.
     File:Backup-recover.png
Protect Your Email & Reputation
Protect your reputation and secure your
e-mail against those who mean you harm:
  1. Setup junk mail filtering.
  2. Protect your social media accounts.
  3. Consider identity, credit, and title monitoring.
     File:Protect-email-reputation.png