Enhanced Protection: Difference between revisions
From GCA ACT
Jump to navigationJump to search
No edit summary |
No edit summary |
||
Line 13: | Line 13: | ||
</div></div> [[File:update-your-defenses.png|frameless|75px|link=Update_Your_Defenses]]</div><br><br> | </div></div> [[File:update-your-defenses.png|frameless|75px|link=Update_Your_Defenses]]</div><br><br> | ||
|- | |- | ||
| style="vertical-align: middle; border: none; text-align: center;" | <div style="display: flex; align-items: center; justify-content: flex-end;"><div style="position:relative; font-weight:bold; font-size:smaller;">Beyond Simple Passwords<br><div style="text-align:left; font-size:smaller;"> | | style="vertical-align: middle; border: none; text-align: center;" | <div style="display: flex; align-items: center; justify-content: flex-end;"><div style="position:relative; font-weight:bold; font-size:smaller;">Beyond Simple Passwords<br><div style="text-align:left; font-size:smaller;">Level up your password game to<br>protect your devices and accounts: | ||
#Use strong passwords. | #Use strong passwords. | ||
#Setup 2FA. | #Setup 2FA. | ||
Line 24: | Line 24: | ||
</div></div> [[File:prevent-phishing-malware.png|frameless|75px|link=Prevent_Phishing_&_Malware]] </div><br><br> | </div></div> [[File:prevent-phishing-malware.png|frameless|75px|link=Prevent_Phishing_&_Malware]] </div><br><br> | ||
|- | |- | ||
| style="vertical-align: middle; border: none; text-align: center;" | <div style="display: flex; align-items: center; justify-content: flex-end;"><div style="position:relative; font-weight:bold; font-size:smaller;">Backup & Recover<br><div style="text-align:left; font-size:smaller;"> | | style="vertical-align: middle; border: none; text-align: center;" | <div style="display: flex; align-items: center; justify-content: flex-end;"><div style="position:relative; font-weight:bold; font-size:smaller;">Backup & Recover<br><div style="text-align:left; font-size:smaller;">Say NO to Ransomware gangs and scammers<br>that lock your data and demand payment: | ||
#Setup backups for your important data. | #Setup backups for your important data. | ||
#Learn how to restore your data. | #Learn how to restore your data. |
Revision as of 22:55, 17 July 2023
Know What You Have File:Know-what-you-have.pngCreate an inventory to know what you need to protect and to identify your risks:
|
Update Your Defenses File:Update-your-defenses.pngBoost your digital immunity against threats such as viruses by updating your systems regularly and securely:
| |
Beyond Simple Passwords File:Beyond-simple-passwords.png Level up your password game to protect your devices and accounts:
|
Prevent Phishing & Malware File:Prevent-phishing-malware.png Stop malware and phishing attacks in their tracks to avoid loss of funds and data, expensive recovery costs, and damage to your reputation:
| |
Backup & Recover File:Backup-recover.pngSay NO to Ransomware gangs and scammers that lock your data and demand payment:
|
Protect Your Email & Reputation File:Protect-email-reputation.pngProtect your reputation and secure your e-mail against those who mean you harm:
|