Enhanced Protection: Difference between revisions

From GCA ACT
Jump to navigationJump to search
No edit summary
No edit summary
 
(10 intermediate revisions by the same user not shown)
Line 1: Line 1:
{| class="wikitable" style="border: none; background-color: transparent; text-align: center;"
{| class="wikitable" style="border: none; background-color: transparent; text-align: center; width: 100%;"
|-
|-
| rowspan="2" style="vertical-align: middle; border: none;" | [[File:Rhinos.png|frameless|225px|link=Basic_Protection]]
| rowspan="2" style="vertical-align: middle; border: none;" | [[File:Rhinos.png|frameless|225px|link=Enhanced_Protection]]
| style="vertical-align: middle; border: none; text-align: center; align-items: center; justify-content: left;" | <div style="font-weight:bold; font-size:smaller;">Know What You Have<br>[[File:know-what-you-have.png|frameless|75px|link=Know_What_You_Have]]<div style="font-size:smaller; font-weight:normal; text-align:left;">Create an inventory to know what you need<br>to protect and to identify your risks:
| style="vertical-align: top; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="font-weight:bold;">Know What You Have<br><br>[[File:ACT_KnowWhat_YouHave_Icon.svg|frameless|75px|link=Know_What_You_Have]]<div style="font-size:smaller; font-weight:normal; text-align:left;"><br>Create an inventory to know what you need to protect and to identify your risks:<br><br>
#Identify your devices and accounts.
#Identify your devices and accounts.
#Identify your applications.
#Identify your applications.
#Identify your risks.
#Identify your risks.
</div></div><br><br>
</div></div>
| style="vertical-align: middle; border: none; text-align: center;" | <div style="display: flex; flex-direction: row-reverse; align-items: center; justify-content: left;"><div style="position:relative; font-weight:bold; font-size:smaller;">Update Your Defenses<br><div style="text-align:left; font-size:smaller;">Boost your digital immunity against threats such as<br>viruses by updating your systems regularly and securely:
| style="vertical-align: top; border: none; background-color: transparent; text-align: center; width: 25%;" | <div style="font-weight:bold;">Update Your Defenses<br><br>[[File:ACT_Update_Your_Defenses_Icon.svg|frameless|75px|link=Update_Your_Defenses]]<div style="text-align:left; font-size:smaller; font-weight:normal;"><br>Boost your digital immunity against threats by updating your systems regularly:<br><br>
#Update your devices and applications.
#Update your devices and applications.
#Encrypt your data.
#Encrypt your data.
#Secure your websites.
#Secure your websites.
</div></div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[[File:update-your-defenses.png|frameless|75px|link=Update_Your_Defenses]]</div><br><br>
</div></div>
|-
| style="vertical-align: top; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="font-weight:bold;">Beyond Simple Passwords<br><br>[[File:ACT_BeyondSimplePasswords_Icon.svg|frameless|75px|link=Beyond_Simple_Passwords]]<div style="text-align:left; font-size:smaller; font-weight:normal;"><br>Level up your password game to protect your devices and accounts:<br><br>
| style="vertical-align: middle; border: none; text-align: center;" | <div style="display: flex; align-items: center; justify-content: flex-end;"><div style="position:relative; font-weight:bold; font-size:smaller;">Beyond Simple Passwords<br><div style="text-align:left; font-size:smaller;">Level up your password game to<br>protect your devices and accounts:
#Use strong passwords.
#Use strong passwords.
#Setup 2FA.
#Setup 2FA.
#Manage your passwords.
#Manage your passwords.
</div></div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[[File:beyond-simple-passwords.png|frameless|75px|link=Beyond_Simple_Passwords]]&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</div><br><br>
</div></div>
| style="vertical-align: middle; border: none; text-align: center;" | <div style="display: flex; flex-direction: row-reverse; align-items: center; justify-content: left;"><div style="position:relative; font-weight:bold; font-size:smaller;">Prevent Phishing & Malware<br><div style="text-align:left; font-size:smaller;">Stop malware and phishing attacks in their tracks<br>to avoid loss of funds and data, expensive<br>recovery costs, and damage to your reputation:
|-
| style="vertical-align: top; border: none; background-color: transparent; text-align: center; width: 25%;" | <div style="font-weight:bold;">Prevent Phishing & Malware<br><br>[[File:ACT_Prevent_Phishing_Malware_Icon.svg|frameless|75px|link=Prevent_Phishing_&_Malware]]<div style="font-size:smaller; font-weight:normal; text-align:left;"><br>Stop malware and phishing attacks in their tracks to avoid loss of funds and data, expensive recovery costs, and damage to your reputation:<br><br>
#Install Anti-Virus Software.
#Install Anti-Virus Software.
#Install an Ad Blocker.
#Install an Ad Blocker.
#Use DNS Security.
#Use DNS Security.
</div></div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[[File:prevent-phishing-malware.png|frameless|75px|link=Prevent_Phishing_&_Malware]]&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</div><br><br>
</div></div>
|-
| style="vertical-align: top; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="font-weight:bold;">Backup & Recover<br><br>[[File:ACT_Backup_Recover_Icon.svg|frameless|75px|link=Backup_Recover]]<div style="text-align:left; font-size:smaller; font-weight:normal;"><br>Say NO to Ransomware gangs and scammers that lock your data and demand payment:<br><br>
| style="vertical-align: middle; border: none; text-align: center;" | <div style="display: flex; align-items: center; justify-content: flex-end;"><div style="position:relative; font-weight:bold; font-size:smaller;">Backup & Recover<br><div style="text-align:left; font-size:smaller;">Say NO to Ransomware gangs and scammers<br>that lock your data and demand payment:
#Setup backups for your important data.
#Setup backups for your important data.
#Learn how to restore your data.
#Learn how to restore your data.
#Encrypt your backups.
#Encrypt your backups.
</div></div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[[File:backup-recover.png|frameless|75px|link=Backup_Recover]]</div>
</div></div>
| style="vertical-align: middle; border: none; text-align: left;" | <div style="display: flex; flex-direction: row-reverse; align-items: center; justify-content: left;"><div style="position:relative; font-weight:bold; font-size:smaller;">Protect Your Email & Reputation<br><div style="text-align:left; font-size:smaller;">Protect your reputation and secure your<br>e-mail against those who mean you harm:
| style="vertical-align: top; border: none; background-color: transparent; text-align: center; width: 25%;" | <div style="font-weight:bold;">Protect Your Email & Reputation<br><br>[[File:ACT_Protect_Email_Reputation_Icon.svg|frameless|75px|link=Protect_Your_Email_&_Reputation]]<div style="text-align:left; font-size:smaller; font-weight:normal;"><br>Protect your reputation and secure your e-mail against those who mean you harm:<br><br>
#Setup junk mail filtering.
#Setup junk mail filtering.
#Protect your social media accounts.
#Protect your social media accounts.
#Consider identity, credit, and title monitoring.
#Consider identity, credit, and title monitoring.
</div></div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[[File:protect-email-reputation.png|frameless|75px|link=Protect_Your_Email_&_Reputation]]</div>
</div></div>
|}
|}

Latest revision as of 05:00, 30 January 2024

Rhinos.png
Know What You Have

ACT KnowWhat YouHave Icon.svg

Create an inventory to know what you need to protect and to identify your risks:

  1. Identify your devices and accounts.
  2. Identify your applications.
  3. Identify your risks.
Update Your Defenses

ACT Update Your Defenses Icon.svg

Boost your digital immunity against threats by updating your systems regularly:

  1. Update your devices and applications.
  2. Encrypt your data.
  3. Secure your websites.
Beyond Simple Passwords

ACT BeyondSimplePasswords Icon.svg

Level up your password game to protect your devices and accounts:

  1. Use strong passwords.
  2. Setup 2FA.
  3. Manage your passwords.
Prevent Phishing & Malware

ACT Prevent Phishing Malware Icon.svg

Stop malware and phishing attacks in their tracks to avoid loss of funds and data, expensive recovery costs, and damage to your reputation:

  1. Install Anti-Virus Software.
  2. Install an Ad Blocker.
  3. Use DNS Security.
Backup & Recover

ACT Backup Recover Icon.svg

Say NO to Ransomware gangs and scammers that lock your data and demand payment:

  1. Setup backups for your important data.
  2. Learn how to restore your data.
  3. Encrypt your backups.
Protect Your Email & Reputation

ACT Protect Email Reputation Icon.svg

Protect your reputation and secure your e-mail against those who mean you harm:

  1. Setup junk mail filtering.
  2. Protect your social media accounts.
  3. Consider identity, credit, and title monitoring.