Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection: Difference between revisions

From GCA ACT
Jump to navigationJump to search
No edit summary
No edit summary
Line 51: Line 51:
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" |
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" |
<div style="position:relative; text-align:left; font-weight:normal; font-size: 75%; z-index: 1;">
<div style="position:relative; text-align:left; font-weight:normal; font-size: 75%; z-index: 1;">
* Navigating by Community Need
* Navigating by Community
* Understanding Your Needs
* Understanding Your Needs
* Finding Community-Specific Resources
* Finding Community Resources
</div>
</div>
! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;" |
! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;" |

Revision as of 01:23, 7 August 2023

ACT NOW
Curious fox 4.png
High Risk Communities
Bees-1.png
Need Help?
German-shepherds.png
Find What You Need
Inquisitive raven 2.png
  • Use SSO, Strong Passwords, & 2FA
  • Install Antivirus & VPN Software
  • Automate Device & Software Updates
  • Volunteer & Commercial Consultants
  • Managed Security Service Providers
  • Cybersecurity Training & Social Media
Ask Here
Find Your Community
Owls.png
Top Threats
Stalking-hyenas.png
Basic Protection
Rhinos.png
Advanced Protection
Elephants.png
  • Navigating by Community
  • Understanding Your Needs
  • Finding Community Resources
  • Understanding Top Threats
  • Discovering Protection Tools
  • Deciding How to Protect Yourself
  • Understanding Cybersecurity Hygiene
  • Finding Fundamental Tools
  • Ensuring Basic Hygiene
  • Moving Beyond the Basics
  • Assessing and Reducing Risks
  • Implementing Advanced Protection