NewMain: Difference between revisions

From GCA ACT
Jump to navigationJump to search
No edit summary
No edit summary
Line 1: Line 1:
{| class="wikitable" style="border: none; background-color: transparent; width: 100%;"
{| class="wikitable" style="border: none; background-color: transparent; width: 100%;"
|-
|-
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" |
! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;" |
<div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">[[Everyday Cybersecurity|Everyday Cybersecurity]]</div>
<div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">[[Everyday Cybersecurity|Everyday Cybersecurity]]</div>
[[File:Curious_fox_4.png|frameless|100px|center|link=Everyday_Cybersecurity]]
[[File:Curious_fox_4.png|frameless|100px|center|link=Everyday_Cybersecurity]]
! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;" |
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;"|
<div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">[[High Risk Communities|High Risk Communities]]</div>
<div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">[[High Risk Communities|High Risk Communities]]</div>
[[File:bees-1.png|frameless|100px|center|link=High_Risk_Communities]]
[[File:bees-1.png|frameless|100px|center|link=High_Risk_Communities]]
! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;"|
<div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">[[Get Help|Get Help]]</div>
[[File:german-shepherds.png|frameless|100px|center|link=Get_Help]]
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" |
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" |
<div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">[[Enhanced Protection|Enhanced Protection]]</div>
[[File:Rhinos.png|frameless|100px|center|link=Enhanced_Protection]]
! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;" |
<div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">[[Advanced Security|Advanced Security]]</div>
<div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">[[Advanced Security|Advanced Security]]</div>
[[File:Elephants.png|frameless|100px|center|link=Advanced_Security]]
[[File:Elephants.png|frameless|100px|center|link=Advanced_Security]]
|-
|-
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" |
! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;" |
<div style="position:relative; text-align:left; font-weight:normal; font-size: 75%; z-index: 1;">
<div style="position:relative; text-align:left; font-weight:normal; font-size: 75%; z-index: 1;">
* Understanding Top Threats
* Use Strong & Unique Passwords
* Discovering Protection Tools
* Enable Two Factor Authentication (2FA)
* Deciding How to Protect Yourself
* Be Cautious with Personal Information
</div>
</div>
! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;" |
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" |
<div style="position:relative; text-align:left; font-weight:normal; font-size: 75%; z-index: 1;">
<div style="position:relative; text-align:left; font-weight:normal; font-size: 75%; z-index: 1;">
* [[Small & Medium Sized Businesses|SMBs]], [[Parents & Families|Parents & Families]], [[High Risk Communities|and MANY MORE.]]
* [[Small & Medium Sized Businesses|SMBs]], [[Parents & Families|Parents & Families]], [[High Risk Communities|and MANY MORE.]]
Line 26: Line 26:
* [mailto:ccd@globalcyberalliance.org?subject=ACT%20Community%20Suggestion Suggest a Community]
* [mailto:ccd@globalcyberalliance.org?subject=ACT%20Community%20Suggestion Suggest a Community]
</div>
</div>
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" |
! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;" |
<div style="position:relative; text-align:left; font-weight:normal; font-size: 75%; z-index: 1;">
<div style="position:relative; text-align:left; font-weight:normal; font-size: 75%; z-index: 1;">
* Understanding Cybersecurity Hygiene
* Volunteer & Commercial Consultants
* Finding Fundamental Tools
* Managed Security Service Providers
* Ensuring Basic Hygiene
* Cybersecurity Training & Social Media
</div>
</div>
! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;" |
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" |
<div style="position:relative; text-align:left; font-weight:normal; font-size: 75%; z-index: 1;">
<div style="position:relative; text-align:left; font-weight:normal; font-size: 75%; z-index: 1;">
* Moving Beyond the Basics
* Moving Beyond the Basics
Line 39: Line 39:
</div>
</div>
|-
|-
! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;"|
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" |
<div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">[[Top Threats|Top Threats]]</div>
<div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">[[Top Threats|Top Threats]]</div>
[[File:stalking-hyenas.png|frameless|100px|center|link=Top_Threats]]
[[File:stalking-hyenas.png|frameless|100px|center|link=Top_Threats]]
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" |
! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;" |
<div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">[[Find Your Community|Find Your Community]]</div>
<div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">[[Find Your Community|Find Your Community]]</div>
[[File:owls.png|frameless|100px|center|link=Find_Your_Community]]
[[File:owls.png|frameless|100px|center|link=Find_Your_Community]]
! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;"|
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;"|
<div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">[[Cybercrime Prevention, Reporting, & Recovery|Cybercrime Prevention & Recovery]]</div>
<div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">[[Cybercrime Prevention, Reporting, & Recovery|Cybercrime Prevention & Recovery]]</div>
[[File:Meerkat_colony_1.png|frameless|100px|center|link=Cybercrime Prevention, Reporting, & Recovery]]
[[File:Meerkat_colony_1.png|frameless|100px|center|link=Cybercrime Prevention, Reporting, & Recovery]]
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;"|
! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;" |
<div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">[[Get Help|Get Help]]</div>
<div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">[[Enhanced Protection|Enhanced Protection]]</div>
[[File:german-shepherds.png|frameless|100px|center|link=Get_Help]]
[[File:Rhinos.png|frameless|100px|center|link=Enhanced_Protection]]
|-
|-
|-
|-
! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;" |
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" |
<div style="position:relative; text-align:left; font-weight:normal; font-size: 75%; z-index: 1;">
* Understanding Top Threats
* Discovering Protection Tools
* Deciding How to Protect Yourself
</div>
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" |
<div style="position:relative; text-align:left; font-weight:normal; font-size: 75%; z-index: 1;">
<div style="position:relative; text-align:left; font-weight:normal; font-size: 75%; z-index: 1;">
* Navigate by Community
* Navigate by Community
* Understanding Your Needs
* Understanding Your Needs
* Locating Community Resources
* Locating Community Resources
</div>
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" |
<div style="position:relative; text-align:left; font-weight:normal; font-size: 75%; z-index: 1;">
* Use Strong & Unique Passwords
* Enable Two Factor Authentication (2FA)
* Be Cautious with Personal Information
</div>
</div>
! style="border: none; background-color: #FFFFFF; width:25%; text-align:left; vertical-align:middle; position:relative;"|
! style="border: none; background-color: #FFFFFF; width:25%; text-align:left; vertical-align:middle; position:relative;"|
Line 71: Line 71:
* Cybercrime Recovery Resources
* Cybercrime Recovery Resources
</div>
</div>
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" |
! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;" |
<div style="position:relative; text-align:left; font-weight:normal; font-size: 75%; z-index: 1;">
<div style="position:relative; text-align:left; font-weight:normal; font-size: 75%; z-index: 1;">
* Volunteer & Commercial Consultants
* Understanding Cybersecurity Hygiene
* Managed Security Service Providers
* Finding Fundamental Tools
* Cybersecurity Training & Social Media
* Ensuring Basic Hygiene
</div>
</div>
|-
|-

Revision as of 04:24, 30 January 2024

Curious fox 4.png
Bees-1.png
German-shepherds.png
Elephants.png
  • Use Strong & Unique Passwords
  • Enable Two Factor Authentication (2FA)
  • Be Cautious with Personal Information
  • Volunteer & Commercial Consultants
  • Managed Security Service Providers
  • Cybersecurity Training & Social Media
  • Moving Beyond the Basics
  • Assessing and Reducing Risks
  • Implementing Advanced Protection
Stalking-hyenas.png
Owls.png
Meerkat colony 1.png
Rhinos.png
  • Understanding Top Threats
  • Discovering Protection Tools
  • Deciding How to Protect Yourself
  • Navigate by Community
  • Understanding Your Needs
  • Locating Community Resources
  • Reporting Cybercrimes
  • Preventing Recurrences
  • Cybercrime Recovery Resources
  • Understanding Cybersecurity Hygiene
  • Finding Fundamental Tools
  • Ensuring Basic Hygiene
You shouldn’t have to be a cybersecurity expert to have the tools to keep you safe. Actionable Cybersecurity Tools (ACT), an initiative by the Global Cyber Alliance (GCA) in partnership with Cyber Civil Defense (CCD) Initiative, is here to help individuals and communities find the right solutions for their protection needs. ACT is easy to use and anyone, regardless of their level of cybersecurity knowledge, can use it to understand risks and find tools to protect themselves, their family, or their organization.

GCA ACT Logo - Full Color.svg developed
by
GCA-Logo-web.png in partnership
with
Cyber Civil Defense Sept 2023.png