NewMain: Difference between revisions
From GCA ACT
Jump to navigationJump to search
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
{| class="wikitable" style="border: none; background-color: transparent; width: 100%;" | {| class="wikitable" style="border: none; background-color: transparent; width: 100%;" | ||
|- | |- | ||
! style="border: none; background-color: # | ! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;" | | ||
<div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">[[Everyday Cybersecurity|Everyday Cybersecurity]]</div> | <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">[[Everyday Cybersecurity|Everyday Cybersecurity]]</div> | ||
[[File:Curious_fox_4.png|frameless|100px|center|link=Everyday_Cybersecurity]] | [[File:Curious_fox_4.png|frameless|100px|center|link=Everyday_Cybersecurity]] | ||
! style="border: none; background-color: # | ! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;"| | ||
<div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">[[High Risk Communities|High Risk Communities]]</div> | <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">[[High Risk Communities|High Risk Communities]]</div> | ||
[[File:bees-1.png|frameless|100px|center|link=High_Risk_Communities]] | [[File:bees-1.png|frameless|100px|center|link=High_Risk_Communities]] | ||
! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;"| | |||
<div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">[[Get Help|Get Help]]</div> | |||
[[File:german-shepherds.png|frameless|100px|center|link=Get_Help]] | |||
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" | | ! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" | | ||
<div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">[[Advanced Security|Advanced Security]]</div> | <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">[[Advanced Security|Advanced Security]]</div> | ||
[[File:Elephants.png|frameless|100px|center|link=Advanced_Security]] | [[File:Elephants.png|frameless|100px|center|link=Advanced_Security]] | ||
|- | |- | ||
! style="border: none; background-color: # | ! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;" | | ||
<div style="position:relative; text-align:left; font-weight:normal; font-size: 75%; z-index: 1;"> | <div style="position:relative; text-align:left; font-weight:normal; font-size: 75%; z-index: 1;"> | ||
* | * Use Strong & Unique Passwords | ||
* | * Enable Two Factor Authentication (2FA) | ||
* | * Be Cautious with Personal Information | ||
</div> | </div> | ||
! style="border: none; background-color: # | ! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" | | ||
<div style="position:relative; text-align:left; font-weight:normal; font-size: 75%; z-index: 1;"> | <div style="position:relative; text-align:left; font-weight:normal; font-size: 75%; z-index: 1;"> | ||
* [[Small & Medium Sized Businesses|SMBs]], [[Parents & Families|Parents & Families]], [[High Risk Communities|and MANY MORE.]] | * [[Small & Medium Sized Businesses|SMBs]], [[Parents & Families|Parents & Families]], [[High Risk Communities|and MANY MORE.]] | ||
Line 26: | Line 26: | ||
* [mailto:ccd@globalcyberalliance.org?subject=ACT%20Community%20Suggestion Suggest a Community] | * [mailto:ccd@globalcyberalliance.org?subject=ACT%20Community%20Suggestion Suggest a Community] | ||
</div> | </div> | ||
! style="border: none; background-color: # | ! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;" | | ||
<div style="position:relative; text-align:left; font-weight:normal; font-size: 75%; z-index: 1;"> | <div style="position:relative; text-align:left; font-weight:normal; font-size: 75%; z-index: 1;"> | ||
* | * Volunteer & Commercial Consultants | ||
* | * Managed Security Service Providers | ||
* | * Cybersecurity Training & Social Media | ||
</div> | </div> | ||
! style="border: none; background-color: # | ! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" | | ||
<div style="position:relative; text-align:left; font-weight:normal; font-size: 75%; z-index: 1;"> | <div style="position:relative; text-align:left; font-weight:normal; font-size: 75%; z-index: 1;"> | ||
* Moving Beyond the Basics | * Moving Beyond the Basics | ||
Line 39: | Line 39: | ||
</div> | </div> | ||
|- | |- | ||
! style="border: none; background-color: # | ! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" | | ||
<div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">[[Top Threats|Top Threats]]</div> | <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">[[Top Threats|Top Threats]]</div> | ||
[[File:stalking-hyenas.png|frameless|100px|center|link=Top_Threats]] | [[File:stalking-hyenas.png|frameless|100px|center|link=Top_Threats]] | ||
! style="border: none; background-color: # | ! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;" | | ||
<div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">[[Find Your Community|Find Your Community]]</div> | <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">[[Find Your Community|Find Your Community]]</div> | ||
[[File:owls.png|frameless|100px|center|link=Find_Your_Community]] | [[File:owls.png|frameless|100px|center|link=Find_Your_Community]] | ||
! style="border: none; background-color: # | ! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;"| | ||
<div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">[[Cybercrime Prevention, Reporting, & Recovery|Cybercrime Prevention & Recovery]]</div> | <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">[[Cybercrime Prevention, Reporting, & Recovery|Cybercrime Prevention & Recovery]]</div> | ||
[[File:Meerkat_colony_1.png|frameless|100px|center|link=Cybercrime Prevention, Reporting, & Recovery]] | [[File:Meerkat_colony_1.png|frameless|100px|center|link=Cybercrime Prevention, Reporting, & Recovery]] | ||
! style="border: none; background-color: # | ! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;" | | ||
<div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">[[ | <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">[[Enhanced Protection|Enhanced Protection]]</div> | ||
[[File: | [[File:Rhinos.png|frameless|100px|center|link=Enhanced_Protection]] | ||
|- | |- | ||
|- | |- | ||
! style="border: none; background-color: # | ! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" | | ||
<div style="position:relative; text-align:left; font-weight:normal; font-size: 75%; z-index: 1;"> | |||
* Understanding Top Threats | |||
* Discovering Protection Tools | |||
* Deciding How to Protect Yourself | |||
</div> | |||
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" | | |||
<div style="position:relative; text-align:left; font-weight:normal; font-size: 75%; z-index: 1;"> | <div style="position:relative; text-align:left; font-weight:normal; font-size: 75%; z-index: 1;"> | ||
* Navigate by Community | * Navigate by Community | ||
* Understanding Your Needs | * Understanding Your Needs | ||
* Locating Community Resources | * Locating Community Resources | ||
</div> | </div> | ||
! style="border: none; background-color: #FFFFFF; width:25%; text-align:left; vertical-align:middle; position:relative;"| | ! style="border: none; background-color: #FFFFFF; width:25%; text-align:left; vertical-align:middle; position:relative;"| | ||
Line 71: | Line 71: | ||
* Cybercrime Recovery Resources | * Cybercrime Recovery Resources | ||
</div> | </div> | ||
! style="border: none; background-color: # | ! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;" | | ||
<div style="position:relative; text-align:left; font-weight:normal; font-size: 75%; z-index: 1;"> | <div style="position:relative; text-align:left; font-weight:normal; font-size: 75%; z-index: 1;"> | ||
* | * Understanding Cybersecurity Hygiene | ||
* | * Finding Fundamental Tools | ||
* | * Ensuring Basic Hygiene | ||
</div> | </div> | ||
|- | |- |
Revision as of 04:24, 30 January 2024
|
|
| |
---|---|---|---|
|
|
|
|