Get Help: Difference between revisions

From GCA ACT
Jump to navigationJump to search
No edit summary
Tag: Manual revert
No edit summary
Line 3: Line 3:
| rowspan="2" style="vertical-align: middle; border: none; width: 25%;" | [[File:german-shepherds.png|frameless|225px|center|link=Need_Help?]]
| rowspan="2" style="vertical-align: middle; border: none; width: 25%;" | [[File:german-shepherds.png|frameless|225px|center|link=Need_Help?]]
| style="vertical-align: middle; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="font-weight:bold;">Events<br>[[File:Migrating_leatherback_sea_turtles_1.png|frameless|75px|link=Events]]</div><div style="font-size:smaller; font-weight:normal;">Malicious software designed to infiltrate and damage computer systems.</div>
| style="vertical-align: middle; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="font-weight:bold;">Events<br>[[File:Migrating_leatherback_sea_turtles_1.png|frameless|75px|link=Events]]</div><div style="font-size:smaller; font-weight:normal;">Malicious software designed to infiltrate and damage computer systems.</div>
| style="vertical-align: middle; border: none; text-align: center; width: 25%;" | <div style="position:relative; font-weight:bold;">Ransomware<br>[[File:ACT_Ransomware_Icon.svg|frameless|75px|link=Ransomware]]</div><div style="font-size:smaller; font-weight:normal;">A type of malware that encrypts files and demands a ransom for their release.</div>
| style="vertical-align: middle; border: none; text-align: center; width: 25%;" | <div style="position:relative; font-weight:bold;">Social Media<br>[[File:Swarming_monarch_butterflies_2.png|frameless|75px|link=Ransomware]]</div><div style="font-size:smaller; font-weight:normal;">A type of malware that encrypts files and demands a ransom for their release.</div>
| style="vertical-align: middle; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="position:relative; font-weight:bold;">Phishing<br>[[File:ACT_Phishing_Icon.svg|frameless|75px|link=Phishing]]<div style="font-size:smaller; font-weight:normal;">Deceptive tactics used to trick users into revealing sensitive information such as passwords or personal details.</div></div>
| style="vertical-align: middle; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="position:relative; font-weight:bold;">Phishing<br>[[File:ACT_Phishing_Icon.svg|frameless|75px|link=Phishing]]<div style="font-size:smaller; font-weight:normal;">Deceptive tactics used to trick users into revealing sensitive information such as passwords or personal details.</div></div>
|-
|-

Revision as of 00:10, 18 August 2023

German-shepherds.png
Events
Migrating leatherback sea turtles 1.png
Malicious software designed to infiltrate and damage computer systems.
Social Media
Swarming monarch butterflies 2.png
A type of malware that encrypts files and demands a ransom for their release.
Phishing
ACT Phishing Icon.svg
Deceptive tactics used to trick users into revealing sensitive information such as passwords or personal details.
Social Engineering
ACT Social Engineering Icon.svg
Manipulative techniques exploiting human behavior to gain unauthorized access to systems.
Data Breach
ACT Data Breach Icon.svg
Unauthorized access to sensitive data, resulting in potential identity theft and privacy breaches.
Insiders
ACT Insiders Icon.svg
Trusted individuals who cause operational disruptions, leak sensitive data, or commit fraud.


Events

Social Media

Podcasts

YouTube

Linked-In Groups - COMING SOON

OTHER RESOURCES - COMING SOON

Training Resources

  • Training & Awareness
  • Awareness Testing
  • Tool Specific Training

Cybersecurity Consultants & Service Providers

  • Volunteer Cybersecurity Organizations
  • Commercial Cybersecurity Consultants
  • Managed Security Service Providers

Self-Service Tools & Services

  • Inventory Tools
  • Incident Response Simulators
  • Self-Assessment Tools

Publications

  • Analysis Reports
  • Periodicals
  • Newsletters & Blogs