Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection: Difference between revisions

From GCA ACT
Jump to navigationJump to search
No edit summary
 
(169 intermediate revisions by 2 users not shown)
Line 1: Line 1:
{| class="wikitable" style="border: none; background-color: transparent; width: 100%;"
{| class="wikitable" style="border: none; background-color: transparent; width: 100%;"
|-
|-
! style="border: none; background-color: transparent; width:25%; text-align:center; vertical-align:top; position:relative;" |
<div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">Take ACTion Today</div>
[[File:Curious_fox_4.png|frameless|100px|center|link=ACT_Now]]
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;"|
<div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">High Risk Communities</div>
[[File:bees-1.png|frameless|100px|center|link=High_Risk_Communities]]
! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;"|
! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;"|
<div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">Need Help?</div>
<div style="display: flex; align-items: center; justify-content: center; text-align:center; font-weight:bold; font-size:150%; z-index: 1;">[[Getting Started|Get Started with ACT]][[File:Swarming_monarch_butterflies_2.png|frameless|100px|center|link=Getting Started]]<br><br></div>
[[File:german-shepherds.png|frameless|100px|center|link=Need_Help?]]
<div style="position:relative; text-align:left; font-weight:bold; font-size:100%; z-index: 1;">
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;"|
* [[Getting Started|Understanding & Navigating ACT]]
<div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">Unsure What You Need?</div>
* [[Getting Started#Search Box|Using ACT to Search for Tools]]
[[File:Inquisitive_raven_2.png|frameless|100px|center|link=Need_Help?]]
* [[Everyday Cybersecurity|Understanding Basic Protection]]
|-
* [[Find Your Community|Community-Specific Protection]]
! style="border: none; background-color: transparent; width:25%; text-align:center; vertical-align:top; position:relative;" |
<div style="display: flex; align-items: center; justify-content: center; text-align:center; font-weight:bold; font-size:150%; z-index: 1;">Cybersecurity Practitioners[[File:Peregrine_falcon_2.png|frameless|75px|center|link=]]<br><br></div>
<div style="position:relative; text-align:left; font-weight:normal; font-size: 75%; z-index: 1;">
<div style="position:relative; text-align:left; font-weight:bold; font-size:100%; z-index: 1;">
* Use SSO, Strong Passwords, & 2FA
* <span style="color: red;">New:</span> [[Threat Taming Tools Collection (T3C)|Threat Taming Tools Collection]]
* Install Antivirus & VPN Software
* [[Top Threats|Top Threats]]
* Automate Device & Software Updates
* [[Enhanced Protection|Enhanced Protection]]
* [[Advanced Security|Advanced Security]]
</div>
</div>
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" |
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" |
<div style="position:relative; text-align:left; font-weight:normal; font-size: 75%; z-index: 1;">
<div style="position:relative; text-align:center; font-weight:bold; font-size:150%; z-index: 1;">[[Everyday Cybersecurity|Everyday Cybersecurity]]<br><br></div>
* [[Small & Medium Businesses - Protection Needs & Approaches|SMBs]], [[Nonprofits & Charities - Protection Needs & Approaches|Nonprofits]], and [[Parents & Families - Protection Needs & Approaches|Parents & Families]]
[[File:Curious_fox_4.png|frameless|175px|center|link=Everyday_Cybersecurity]]<br>
* [[High Risk Communities|OTHERS COMING SOON]]
<div style="position:relative; text-align:left; font-weight:normal; font-size: 100%; z-index: 1;">
* Use Strong & Unique Passwords
* Enable Two Factor Authentication (2FA)
* Be Cautious with Personal Information
</div>
! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;"|
<div style="position:relative; text-align:center; font-weight:bold; font-size:150%; z-index: 1;">[[High Risk Communities|High Risk Communities]]<br><br></div>[[File:bees-1.png|frameless|175px|center|link=High_Risk_Communities]]<br>
<div style="position:relative; text-align:left; font-weight:normal; font-size: 100%; z-index: 1;">
* [[Parents & Families|Parents & Families]], [[Small & Medium Sized Businesses|SMBs]], [[High Risk Communities|and MORE.]]
* [[High Risk Communities#Coming Soon|OTHERS COMING SOON]]
* [mailto:[email protected]?subject=ACT%20Community%20Suggestion Suggest a Community]
* [mailto:[email protected]?subject=ACT%20Community%20Suggestion Suggest a Community]
</div>
</div>
! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;" |
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;"|
<div style="position:relative; text-align:left; font-weight:normal; font-size: 75%; z-index: 1;">
<div style="position:relative; text-align:center; font-weight:bold; font-size:150%; z-index: 1;">[[Get Help|Get Help]]<br><br></div>
* Volunteer & Commercial Consultants
[[File:german-shepherds.png|frameless|175px|center|link=Get_Help]]<br>
* Managed Security Service Providers
<div style="position:relative; text-align:left; font-weight:normal; font-size: 100%; z-index: 1;">
* [[Cybercrime Prevention, Reporting, & Recovery|Cybercrime Reporting & Recovery]]
* Volunteers, Consultants, and MSSPs
* Cybersecurity Training & Social Media
* Cybersecurity Training & Social Media
</div>
</div>
! style="border: none; background-color: #EBEBEB; width:25%; text-align:left; vertical-align:middle; position:relative;"|
|}
<div style="text-align:left; vertical-align:middle; font-weight:bold; opacity:0.5;">Ask Here</div>
<div style="display: flex;">
|-
  <div style="flex: 1;">
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" |
    <table style="border: none; background-color: transparent; text-align: center; width: 100%;">
<div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">Find Your Community</div>
      {| style="border: none; text-align: center; width: 100%;"
[[File:owls.png|frameless|100px|center|link=Find_Your_Community]]
      |-
! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;" |
      | style="border: none; background-color: transparent;" colspan="5";" | <span style="font-size: 135%; font-weight: bold;"><br>You don’t have to be a cybersecurity expert to have the tools to stay safe.</span><br><br><span style="font-size: 100%; font-weight: bold;">Actionable Cybersecurity Tools (ACT), an initiative by the Global Cyber Alliance (GCA) in partnership with Cyber Civil Defense (CCD) Initiative, is here to help individuals and communities find the right solutions for their protection needs. ACT is easy to use and anyone, regardless of their level of cybersecurity knowledge, can use it to understand risks and find tools to protect themselves, their family, or their organization.</span><br><br>
<div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">Top Threats</div>
      |-
[[File:stalking-hyenas.png|frameless|100px|center|link=Top_Threats]]
      | style="width: 30%; text-align: right;" |[[File:GCA_ACT_Logo_-_Full_Color.svg|frameless|210px|link=https://act.globalcyberalliance.org/]]
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" |
      | style="width: 10%; font-weight: bold; text-align:center;" | developed<br>by
<div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">Basic Protection</div>
      | style="width: 18%; text-align: center;" | [[File:GCA-Logo-web.png|frameless|165px|link=https://www.globalcyberalliance.org/]]
[[File:Rhinos.png|frameless|100px|center|link=Basic_Protection]]
      | style="width: 12%; font-weight: bold; text-align: center;" | in partnership<br>with
! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;" |
      | style="width: 30%; text-align: left;" | [[File:Cyber_Civil_Defense_Sept_2023.png|frameless|195px|link=https://www.globalcyberalliance.org/cyber-civil-defense/]]
<div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">Advanced Protection</div>
      |}
[[File:Elephants.png|frameless|100px|center|link=Advanced_Protection]]
    </table>
|-
  </div>
|-
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" |
<div style="position:relative; text-align:left; font-weight:normal; font-size: 75%; z-index: 1;">
* Navigating by Community Need
* Understanding Your Needs
* Finding Community-Specific Resources
</div>
! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;" |
<div style="position:relative; text-align:left; font-weight:normal; font-size: 75%; z-index: 1;">
* Understanding Top Threats
* Discovering Protection Tools
* Deciding How to Protect Yourself
</div>
</div>
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" |
<div style="position:relative; text-align:left; font-weight:normal; font-size: 75%; z-index: 1;">
* Understanding Cybersecurity Hygiene
* Finding Fundamental Tools
* Implementing Basic Hygiene
</div>
! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;" |
<div style="position:relative; text-align:left; font-weight:normal; font-size: 75%; z-index: 1;">
* Moving Beyond the Basics
* Assessing and Reducing Risks
* Implementing Advanced Protection
</div>
|-
|}

Latest revision as of 15:22, 9 July 2024

Curious fox 4.png

  • Use Strong & Unique Passwords
  • Enable Two Factor Authentication (2FA)
  • Be Cautious with Personal Information
Bees-1.png

German-shepherds.png


You don’t have to be a cybersecurity expert to have the tools to stay safe.


Actionable Cybersecurity Tools (ACT), an initiative by the Global Cyber Alliance (GCA) in partnership with Cyber Civil Defense (CCD) Initiative, is here to help individuals and communities find the right solutions for their protection needs. ACT is easy to use and anyone, regardless of their level of cybersecurity knowledge, can use it to understand risks and find tools to protect themselves, their family, or their organization.

GCA ACT Logo - Full Color.svg developed
by
GCA-Logo-web.png in partnership
with
Cyber Civil Defense Sept 2023.png