Enhanced Protection: Difference between revisions

From GCA ACT
Jump to navigationJump to search
No edit summary
No edit summary
Line 23: Line 23:
#Use DNS Security.
#Use DNS Security.
</div></div>
</div></div>
| style="vertical-align: top; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="font-weight:bold;">Backup & Recover<br><br>[[File:backup-recover.png|frameless|75px|link=Backup_Recover]]<div style="text-align:left; font-size:smaller; font-weight:normal;">Say NO to Ransomware gangs and scammers that lock your data and demand payment:<br><br>
| style="vertical-align: top; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="font-weight:bold;">Backup & Recover<br><br>[[File:backup-recover.png|frameless|75px|link=Backup_Recover]]<div style="text-align:left; font-size:smaller; font-weight:normal;"><br>Say NO to Ransomware gangs and scammers that lock your data and demand payment:<br><br>
#Setup backups for your important data.
#Setup backups for your important data.
#Learn how to restore your data.
#Learn how to restore your data.
#Encrypt your backups.
#Encrypt your backups.
</div></div>
</div></div>
| style="vertical-align: top; border: none; background-color: transparent; text-align: center; width: 25%;" | <div style="font-weight:bold;">Protect Your Email & Reputation<br><br>[[File:protect-email-reputation.png|frameless|75px|link=Protect_Your_Email_&_Reputation]]<div style="text-align:left; font-size:smaller; font-weight:normal;">Protect your reputation and secure your e-mail against those who mean you harm:<br><br>
| style="vertical-align: top; border: none; background-color: transparent; text-align: center; width: 25%;" | <div style="font-weight:bold;">Protect Your Email & Reputation<br><br>[[File:protect-email-reputation.png|frameless|75px|link=Protect_Your_Email_&_Reputation]]<div style="text-align:left; font-size:smaller; font-weight:normal;"><br>Protect your reputation and secure your e-mail against those who mean you harm:<br><br>
#Setup junk mail filtering.
#Setup junk mail filtering.
#Protect your social media accounts.
#Protect your social media accounts.

Revision as of 00:03, 7 August 2023

Rhinos.png
Know What You Have

File:Know-what-you-have.png

Create an inventory to know what you need to protect and to identify your risks:

  1. Identify your devices and accounts.
  2. Identify your applications.
  3. Identify your risks.
Update Your Defenses

File:Update-your-defenses.png

Boost your digital immunity against threats by updating your systems regularly:

  1. Update your devices and applications.
  2. Encrypt your data.
  3. Secure your websites.
Beyond Simple Passwords

File:Beyond-simple-passwords.png

Level up your password game to protect your devices and accounts:

  1. Use strong passwords.
  2. Setup 2FA.
  3. Manage your passwords.
Prevent Phishing & Malware

File:Prevent-phishing-malware.png

Stop malware and phishing attacks in their tracks to avoid loss of funds and data, expensive recovery costs, and damage to your reputation:

  1. Install Anti-Virus Software.
  2. Install an Ad Blocker.
  3. Use DNS Security.
Backup & Recover

File:Backup-recover.png

Say NO to Ransomware gangs and scammers that lock your data and demand payment:

  1. Setup backups for your important data.
  2. Learn how to restore your data.
  3. Encrypt your backups.
Protect Your Email & Reputation

File:Protect-email-reputation.png

Protect your reputation and secure your e-mail against those who mean you harm:

  1. Setup junk mail filtering.
  2. Protect your social media accounts.
  3. Consider identity, credit, and title monitoring.