Enhanced Protection: Difference between revisions
From GCA ACT
Jump to navigationJump to search
No edit summary |
No edit summary |
||
(6 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
{| class="wikitable" style="border: none; background-color: transparent; text-align: center; width: 100%;" | {| class="wikitable" style="border: none; background-color: transparent; text-align: center; width: 100%;" | ||
|- | |- | ||
| rowspan="2" style="vertical-align: middle; border: none;" | [[File:Rhinos.png|frameless|225px|link= | | rowspan="2" style="vertical-align: middle; border: none;" | [[File:Rhinos.png|frameless|225px|link=Enhanced_Protection]] | ||
| style="vertical-align: top; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="font-weight:bold;">Know What You Have<br><br>[[File: | | style="vertical-align: top; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="font-weight:bold;">Know What You Have<br><br>[[File:ACT_KnowWhat_YouHave_Icon.svg|frameless|75px|link=Know_What_You_Have]]<div style="font-size:smaller; font-weight:normal; text-align:left;"><br>Create an inventory to know what you need to protect and to identify your risks:<br><br> | ||
#Identify your devices and accounts. | #Identify your devices and accounts. | ||
#Identify your applications. | #Identify your applications. | ||
#Identify your risks. | #Identify your risks. | ||
</div></div> | </div></div> | ||
| style="vertical-align: top; border: none; background-color: transparent; text-align: center; width: 25%;" | <div style="font-weight:bold;">Update Your Defenses<br><br>[[File: | | style="vertical-align: top; border: none; background-color: transparent; text-align: center; width: 25%;" | <div style="font-weight:bold;">Update Your Defenses<br><br>[[File:ACT_Update_Your_Defenses_Icon.svg|frameless|75px|link=Update_Your_Defenses]]<div style="text-align:left; font-size:smaller; font-weight:normal;"><br>Boost your digital immunity against threats by updating your systems regularly:<br><br> | ||
#Update your devices and applications. | #Update your devices and applications. | ||
#Encrypt your data. | #Encrypt your data. | ||
#Secure your websites. | #Secure your websites. | ||
</div></div> | </div></div> | ||
| style="vertical-align: top; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="font-weight:bold;">Beyond Simple Passwords<br><br>[[File: | | style="vertical-align: top; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="font-weight:bold;">Beyond Simple Passwords<br><br>[[File:ACT_BeyondSimplePasswords_Icon.svg|frameless|75px|link=Beyond_Simple_Passwords]]<div style="text-align:left; font-size:smaller; font-weight:normal;"><br>Level up your password game to protect your devices and accounts:<br><br> | ||
#Use strong passwords. | #Use strong passwords. | ||
#Setup 2FA. | #Setup 2FA. | ||
Line 18: | Line 18: | ||
</div></div> | </div></div> | ||
|- | |- | ||
| style="vertical-align: top; border: none; background-color: transparent; text-align: center; width: 25%;" | <div style="font-weight:bold;">Prevent Phishing & Malware<br><br>[[File: | | style="vertical-align: top; border: none; background-color: transparent; text-align: center; width: 25%;" | <div style="font-weight:bold;">Prevent Phishing & Malware<br><br>[[File:ACT_Prevent_Phishing_Malware_Icon.svg|frameless|75px|link=Prevent_Phishing_&_Malware]]<div style="font-size:smaller; font-weight:normal; text-align:left;"><br>Stop malware and phishing attacks in their tracks to avoid loss of funds and data, expensive recovery costs, and damage to your reputation:<br><br> | ||
#Install Anti-Virus Software. | #Install Anti-Virus Software. | ||
#Install an Ad Blocker. | #Install an Ad Blocker. | ||
#Use DNS Security. | #Use DNS Security. | ||
</div></div> | </div></div> | ||
| style="vertical-align: top; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="font-weight:bold;">Backup & Recover<br><br>[[File: | | style="vertical-align: top; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="font-weight:bold;">Backup & Recover<br><br>[[File:ACT_Backup_Recover_Icon.svg|frameless|75px|link=Backup_Recover]]<div style="text-align:left; font-size:smaller; font-weight:normal;"><br>Say NO to Ransomware gangs and scammers that lock your data and demand payment:<br><br> | ||
#Setup backups for your important data. | #Setup backups for your important data. | ||
#Learn how to restore your data. | #Learn how to restore your data. | ||
#Encrypt your backups. | #Encrypt your backups. | ||
</div></div> | </div></div> | ||
| style="vertical-align: top; border: none; background-color: transparent; text-align: center; width: 25%;" | <div style="font-weight:bold;">Protect Your Email & Reputation<br><br>[[File: | | style="vertical-align: top; border: none; background-color: transparent; text-align: center; width: 25%;" | <div style="font-weight:bold;">Protect Your Email & Reputation<br><br>[[File:ACT_Protect_Email_Reputation_Icon.svg|frameless|75px|link=Protect_Your_Email_&_Reputation]]<div style="text-align:left; font-size:smaller; font-weight:normal;"><br>Protect your reputation and secure your e-mail against those who mean you harm:<br><br> | ||
#Setup junk mail filtering. | #Setup junk mail filtering. | ||
#Protect your social media accounts. | #Protect your social media accounts. |