Enhanced Protection: Difference between revisions

From GCA ACT
Jump to navigationJump to search
No edit summary
No edit summary
 
(3 intermediate revisions by the same user not shown)
Line 1: Line 1:
{| class="wikitable" style="border: none; background-color: transparent; text-align: center; width: 100%;"
{| class="wikitable" style="border: none; background-color: transparent; text-align: center; width: 100%;"
|-
|-
| rowspan="2" style="vertical-align: middle; border: none;" | [[File:Rhinos.png|frameless|225px|link=Basic_Protection]]
| rowspan="2" style="vertical-align: middle; border: none;" | [[File:Rhinos.png|frameless|225px|link=Enhanced_Protection]]
| style="vertical-align: top; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="font-weight:bold;">Know What You Have<br><br>[[File:ACT_KnowWhat_YouHave_Icon.svg|frameless|75px|link=Know_What_You_Have]]<div style="font-size:smaller; font-weight:normal; text-align:left;"><br>Create an inventory to know what you need to protect and to identify your risks:<br><br>
| style="vertical-align: top; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="font-weight:bold;">Know What You Have<br><br>[[File:ACT_KnowWhat_YouHave_Icon.svg|frameless|75px|link=Know_What_You_Have]]<div style="font-size:smaller; font-weight:normal; text-align:left;"><br>Create an inventory to know what you need to protect and to identify your risks:<br><br>
#Identify your devices and accounts.
#Identify your devices and accounts.
Line 7: Line 7:
#Identify your risks.
#Identify your risks.
</div></div>
</div></div>
| style="vertical-align: top; border: none; background-color: transparent; text-align: center; width: 25%;" | <div style="font-weight:bold;">Update Your Defenses<br><br>[[File:ACT_Update_Your_Defenses_Icon.png|frameless|75px|link=Update_Your_Defenses]]<div style="text-align:left; font-size:smaller; font-weight:normal;"><br>Boost your digital immunity against threats by updating your systems regularly:<br><br>
| style="vertical-align: top; border: none; background-color: transparent; text-align: center; width: 25%;" | <div style="font-weight:bold;">Update Your Defenses<br><br>[[File:ACT_Update_Your_Defenses_Icon.svg|frameless|75px|link=Update_Your_Defenses]]<div style="text-align:left; font-size:smaller; font-weight:normal;"><br>Boost your digital immunity against threats by updating your systems regularly:<br><br>
#Update your devices and applications.
#Update your devices and applications.
#Encrypt your data.
#Encrypt your data.
#Secure your websites.
#Secure your websites.
</div></div>
</div></div>
| style="vertical-align: top; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="font-weight:bold;">Beyond Simple Passwords<br><br>[[File:ACT_Beyond_Simple_Passwords_Icon.svg|frameless|75px|link=Beyond_Simple_Passwords]]<div style="text-align:left; font-size:smaller; font-weight:normal;"><br>Level up your password game to protect your devices and accounts:<br><br>
| style="vertical-align: top; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="font-weight:bold;">Beyond Simple Passwords<br><br>[[File:ACT_BeyondSimplePasswords_Icon.svg|frameless|75px|link=Beyond_Simple_Passwords]]<div style="text-align:left; font-size:smaller; font-weight:normal;"><br>Level up your password game to protect your devices and accounts:<br><br>
#Use strong passwords.
#Use strong passwords.
#Setup 2FA.
#Setup 2FA.

Latest revision as of 05:00, 30 January 2024

Rhinos.png
Know What You Have

ACT KnowWhat YouHave Icon.svg

Create an inventory to know what you need to protect and to identify your risks:

  1. Identify your devices and accounts.
  2. Identify your applications.
  3. Identify your risks.
Update Your Defenses

ACT Update Your Defenses Icon.svg

Boost your digital immunity against threats by updating your systems regularly:

  1. Update your devices and applications.
  2. Encrypt your data.
  3. Secure your websites.
Beyond Simple Passwords

ACT BeyondSimplePasswords Icon.svg

Level up your password game to protect your devices and accounts:

  1. Use strong passwords.
  2. Setup 2FA.
  3. Manage your passwords.
Prevent Phishing & Malware

ACT Prevent Phishing Malware Icon.svg

Stop malware and phishing attacks in their tracks to avoid loss of funds and data, expensive recovery costs, and damage to your reputation:

  1. Install Anti-Virus Software.
  2. Install an Ad Blocker.
  3. Use DNS Security.
Backup & Recover

ACT Backup Recover Icon.svg

Say NO to Ransomware gangs and scammers that lock your data and demand payment:

  1. Setup backups for your important data.
  2. Learn how to restore your data.
  3. Encrypt your backups.
Protect Your Email & Reputation

ACT Protect Email Reputation Icon.svg

Protect your reputation and secure your e-mail against those who mean you harm:

  1. Setup junk mail filtering.
  2. Protect your social media accounts.
  3. Consider identity, credit, and title monitoring.