Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection: Difference between revisions

From GCA ACT
Jump to navigationJump to search
No edit summary
No edit summary
Line 11: Line 11:
[[File:german-shepherds.png|frameless|100px|center|link=Get_Help]]
[[File:german-shepherds.png|frameless|100px|center|link=Get_Help]]
! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;"|
! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;"|
<div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">Unsure What You Need?</div>
<div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">Cybercrime Recovery</div>
[[File:Wolf_spider_crawling.png|frameless|100px|center|link=Cybercrime Recovery]]
[[File:Wolf_spider_crawling.png|frameless|100px|center|link=Cybercrime Recovery]]
|-
|-

Revision as of 01:37, 26 August 2023

Everyday Cybersecurity
Curious fox 4.png
High Risk Communities
Bees-1.png
Get Help
German-shepherds.png
Cybercrime Recovery
Wolf spider crawling.png
  • Use SSO, Strong Passwords, & 2FA
  • Install Antivirus & VPN Software
  • Automate Device & Software Updates
  • Volunteer & Commercial Consultants
  • Managed Security Service Providers
  • Cybersecurity Training & Social Media
Ask Here
Find Your Community
Owls.png
Top Threats
Stalking-hyenas.png
Basic Protection
Rhinos.png
Advanced Protection
Elephants.png
  • Navigate by Community
  • Understanding Your Needs
  • Locating Community Resources
  • Understanding Top Threats
  • Discovering Protection Tools
  • Deciding How to Protect Yourself
  • Understanding Cybersecurity Hygiene
  • Finding Fundamental Tools
  • Ensuring Basic Hygiene
  • Moving Beyond the Basics
  • Assessing and Reducing Risks
  • Implementing Advanced Protection