Enhanced Protection: Difference between revisions

From GCA ACT
Jump to navigationJump to search
No edit summary
No edit summary
 
(34 intermediate revisions by the same user not shown)
Line 1: Line 1:
{| class="wikitable" style="border: none; background-color: transparent; width: 100%;"
{| class="wikitable" style="border: none; background-color: transparent; text-align: center; width: 100%;"
|-
|-
| style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | <div style="position:relative; text-align:center; font-weight:bold; font-size:smaller; z-index: 1;">Know What You Have</div> <div style="padding: 5px;">[[File:know-what-you-have.png|frameless|50px|center]]</div>
| rowspan="2" style="vertical-align: middle; border: none;" | [[File:Rhinos.png|frameless|225px|link=Enhanced_Protection]]
| style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | <div style="position:relative; text-align:center; font-weight:bold; font-size:smaller; z-index: 1;">Update Your Defenses</div> <div style="padding: 5px;">[[File:update-your-defenses.png|frameless|50px|center]]</div>
| style="vertical-align: top; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="font-weight:bold;">Know What You Have<br><br>[[File:ACT_KnowWhat_YouHave_Icon.svg|frameless|75px|link=Know_What_You_Have]]<div style="font-size:smaller; font-weight:normal; text-align:left;"><br>Create an inventory to know what you need to protect and to identify your risks:<br><br>
| style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | <div style="position:relative; text-align:center; font-weight:bold; font-size:smaller; z-index: 1;">Beyond Simple Passwords</div> <div style="padding: 5px;">[[File:beyond-simple-passwords.png|frameless|50px|center]]</div>
#Identify your devices and accounts.
#Identify your applications.
#Identify your risks.
</div></div>
| style="vertical-align: top; border: none; background-color: transparent; text-align: center; width: 25%;" | <div style="font-weight:bold;">Update Your Defenses<br><br>[[File:ACT_Update_Your_Defenses_Icon.svg|frameless|75px|link=Update_Your_Defenses]]<div style="text-align:left; font-size:smaller; font-weight:normal;"><br>Boost your digital immunity against threats by updating your systems regularly:<br><br>
#Update your devices and applications.
#Encrypt your data.
#Secure your websites.
</div></div>
| style="vertical-align: top; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="font-weight:bold;">Beyond Simple Passwords<br><br>[[File:ACT_BeyondSimplePasswords_Icon.svg|frameless|75px|link=Beyond_Simple_Passwords]]<div style="text-align:left; font-size:smaller; font-weight:normal;"><br>Level up your password game to protect your devices and accounts:<br><br>
#Use strong passwords.
#Setup 2FA.
#Manage your passwords.
</div></div>
|-
|-
| style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | <div style="position:relative; text-align:center; font-weight:bold; font-size:smaller; z-index: 1;">Phishing & Malware</div> <div style="padding: 5px;">[[File:prevent-phishing-malware.png|frameless|50px|center]]</div>
| style="vertical-align: top; border: none; background-color: transparent; text-align: center; width: 25%;" | <div style="font-weight:bold;">Prevent Phishing & Malware<br><br>[[File:ACT_Prevent_Phishing_Malware_Icon.svg|frameless|75px|link=Prevent_Phishing_&_Malware]]<div style="font-size:smaller; font-weight:normal; text-align:left;"><br>Stop malware and phishing attacks in their tracks to avoid loss of funds and data, expensive recovery costs, and damage to your reputation:<br><br>
| style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | <div style="position:relative; text-align:center; font-weight:bold; font-size:smaller; z-index: 1;">Backup & Recover</div> <div style="padding: 5px;">[[File:backup-recover.png|frameless|50px|center]]</div>
#Install Anti-Virus Software.
| style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | <div style="position:relative; text-align:center; font-weight:bold; font-size:smaller; z-index: 1;">Email & Reputation</div> <div style="padding: 5px;">[[File:protect-email-reputation.png|frameless|50px|center]]</div>
#Install an Ad Blocker.
#Use DNS Security.
</div></div>
| style="vertical-align: top; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="font-weight:bold;">Backup & Recover<br><br>[[File:ACT_Backup_Recover_Icon.svg|frameless|75px|link=Backup_Recover]]<div style="text-align:left; font-size:smaller; font-weight:normal;"><br>Say NO to Ransomware gangs and scammers that lock your data and demand payment:<br><br>
#Setup backups for your important data.
#Learn how to restore your data.
#Encrypt your backups.
</div></div>
| style="vertical-align: top; border: none; background-color: transparent; text-align: center; width: 25%;" | <div style="font-weight:bold;">Protect Your Email & Reputation<br><br>[[File:ACT_Protect_Email_Reputation_Icon.svg|frameless|75px|link=Protect_Your_Email_&_Reputation]]<div style="text-align:left; font-size:smaller; font-weight:normal;"><br>Protect your reputation and secure your e-mail against those who mean you harm:<br><br>
#Setup junk mail filtering.
#Protect your social media accounts.
#Consider identity, credit, and title monitoring.
</div></div>
|}

Latest revision as of 05:00, 30 January 2024

Rhinos.png
Know What You Have

ACT KnowWhat YouHave Icon.svg

Create an inventory to know what you need to protect and to identify your risks:

  1. Identify your devices and accounts.
  2. Identify your applications.
  3. Identify your risks.
Update Your Defenses

ACT Update Your Defenses Icon.svg

Boost your digital immunity against threats by updating your systems regularly:

  1. Update your devices and applications.
  2. Encrypt your data.
  3. Secure your websites.
Beyond Simple Passwords

ACT BeyondSimplePasswords Icon.svg

Level up your password game to protect your devices and accounts:

  1. Use strong passwords.
  2. Setup 2FA.
  3. Manage your passwords.
Prevent Phishing & Malware

ACT Prevent Phishing Malware Icon.svg

Stop malware and phishing attacks in their tracks to avoid loss of funds and data, expensive recovery costs, and damage to your reputation:

  1. Install Anti-Virus Software.
  2. Install an Ad Blocker.
  3. Use DNS Security.
Backup & Recover

ACT Backup Recover Icon.svg

Say NO to Ransomware gangs and scammers that lock your data and demand payment:

  1. Setup backups for your important data.
  2. Learn how to restore your data.
  3. Encrypt your backups.
Protect Your Email & Reputation

ACT Protect Email Reputation Icon.svg

Protect your reputation and secure your e-mail against those who mean you harm:

  1. Setup junk mail filtering.
  2. Protect your social media accounts.
  3. Consider identity, credit, and title monitoring.