Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection: Difference between revisions

From GCA ACT
Jump to navigationJump to search
No edit summary
No edit summary
 
(48 intermediate revisions by the same user not shown)
Line 2: Line 2:
|-
|-
! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;"|
! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;"|
<div style="position:relative; text-align:center; font-weight:bold; font-size:150%; z-index: 1;">Getting Started<br><br></div>
<div style="display: flex; align-items: center; justify-content: center; text-align:center; font-weight:bold; font-size:150%; z-index: 1;">[[Getting Started|Get Started with ACT]][[File:Swarming_monarch_butterflies_2.png|frameless|100px|center|link=Getting Started]]<br><br></div>
<div style="position:relative; text-align:left; font-weight:normal; font-size:100%; z-index: 1;">
<div style="position:relative; text-align:left; font-weight:bold; font-size:100%; z-index: 1;">
* Site Navigation Guidance
* [[Getting Started|Understanding & Navigating ACT]]
* Searching for Tools
* [[Getting Started#Search Box|Using ACT to Search for Tools]]
* Just-the-Basics: Everyday Cybersecurity
* [[Everyday Cybersecurity|Understanding Basic Protection]]
* Navigate by Needs: Find Your Community
* [[Find Your Community|Community-Specific Protection]]
* Cybercrime: Reporting & Recovery Resources
<div style="display: flex; align-items: center; justify-content: center; text-align:center; font-weight:bold; font-size:150%; z-index: 1;">Cybersecurity Practitioners[[File:Peregrine_falcon_2.png|frameless|75px|center|link=]]<br><br></div>
* Cybersecurity Practitioners:
<div style="position:relative; text-align:left; font-weight:bold; font-size:100%; z-index: 1;">
** Top Threats
* <span style="color: red;">New:</span> [[Threat Taming Tools Collection (T3C)|Threat Taming Tools Collection]]
** Enhanced Protection
* [[Top Threats|Top Threats]]
** Advanced Security
* [[Enhanced Protection|Enhanced Protection]]
* [[Advanced Security|Advanced Security]]
</div>
</div>
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" |
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" |

Latest revision as of 15:22, 9 July 2024

Curious fox 4.png

  • Use Strong & Unique Passwords
  • Enable Two Factor Authentication (2FA)
  • Be Cautious with Personal Information
Bees-1.png

German-shepherds.png


You don’t have to be a cybersecurity expert to have the tools to stay safe.


Actionable Cybersecurity Tools (ACT), an initiative by the Global Cyber Alliance (GCA) in partnership with Cyber Civil Defense (CCD) Initiative, is here to help individuals and communities find the right solutions for their protection needs. ACT is easy to use and anyone, regardless of their level of cybersecurity knowledge, can use it to understand risks and find tools to protect themselves, their family, or their organization.

GCA ACT Logo - Full Color.svg developed
by
GCA-Logo-web.png in partnership
with
Cyber Civil Defense Sept 2023.png