|
|
Line 11: |
Line 11: |
| [[File:german-shepherds.png|frameless|100px|center|link=Get_Help]] | | [[File:german-shepherds.png|frameless|100px|center|link=Get_Help]] |
| ! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" | | | ! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" | |
| <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">[[Advanced Security|Advanced Security]]</div> | | <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">[[Advanced Security|SLIDESHOW PLACEHOLDER]]</div> |
| [[File:Elephants.png|frameless|100px|center|link=Advanced_Security]] | | [[File:Elephants.png|frameless|100px|center|link=Advanced_Security]] |
| |- | | |- |
Line 38: |
Line 38: |
| * Implementing Advanced Protection | | * Implementing Advanced Protection |
| </div> | | </div> |
| |-
| |
| ! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" |
| |
| <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">[[Top Threats|Top Threats]]</div>
| |
| [[File:stalking-hyenas.png|frameless|100px|center|link=Top_Threats]]
| |
| ! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;" |
| |
| <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">[[Find Your Community|Find Your Community]]</div>
| |
| [[File:owls.png|frameless|100px|center|link=Find_Your_Community]]
| |
| ! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;"|
| |
| <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">[[Cybercrime Prevention, Reporting, & Recovery|Cybercrime Prevention & Recovery]]</div>
| |
| [[File:Meerkat_colony_1.png|frameless|100px|center|link=Cybercrime Prevention, Reporting, & Recovery]]
| |
| ! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;" |
| |
| <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">[[Enhanced Protection|Enhanced Protection]]</div>
| |
| [[File:Rhinos.png|frameless|100px|center|link=Enhanced_Protection]]
| |
| |-
| |
| |-
| |
| ! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" |
| |
| <div style="position:relative; text-align:left; font-weight:normal; font-size: 75%; z-index: 1;">
| |
| * Understanding Top Threats
| |
| * Discovering Protection Tools
| |
| * Deciding How to Protect Yourself
| |
| </div>
| |
| ! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" |
| |
| <div style="position:relative; text-align:left; font-weight:normal; font-size: 75%; z-index: 1;">
| |
| * Navigate by Community
| |
| * Understanding Your Needs
| |
| * Locating Community Resources
| |
| </div>
| |
| ! style="border: none; background-color: #FFFFFF; width:25%; text-align:left; vertical-align:middle; position:relative;"|
| |
| <div style="position:relative; text-align:left; font-weight:normal; font-size: 75%; z-index: 1;">
| |
| * Reporting Cybercrimes
| |
| * Preventing Recurrences
| |
| * Cybercrime Recovery Resources
| |
| </div>
| |
| ! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;" |
| |
| <div style="position:relative; text-align:left; font-weight:normal; font-size: 75%; z-index: 1;">
| |
| * Understanding Cybersecurity Hygiene
| |
| * Finding Fundamental Tools
| |
| * Ensuring Basic Hygiene
| |
| </div>
| |
| |-
| |
| |} | | |} |
| <div style="display: flex;"> | | <div style="display: flex;"> |