NewMain: Difference between revisions

From GCA ACT
Jump to navigationJump to search
No edit summary
No edit summary
Line 11: Line 11:
[[File:german-shepherds.png|frameless|100px|center|link=Get_Help]]
[[File:german-shepherds.png|frameless|100px|center|link=Get_Help]]
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" |
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" |
<div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">[[Advanced Security|Advanced Security]]</div>
<div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">[[Advanced Security|SLIDESHOW PLACEHOLDER]]</div>
[[File:Elephants.png|frameless|100px|center|link=Advanced_Security]]
[[File:Elephants.png|frameless|100px|center|link=Advanced_Security]]
|-
|-
Line 38: Line 38:
* Implementing Advanced Protection
* Implementing Advanced Protection
</div>
</div>
|-
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" |
<div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">[[Top Threats|Top Threats]]</div>
[[File:stalking-hyenas.png|frameless|100px|center|link=Top_Threats]]
! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;" |
<div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">[[Find Your Community|Find Your Community]]</div>
[[File:owls.png|frameless|100px|center|link=Find_Your_Community]]
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;"|
<div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">[[Cybercrime Prevention, Reporting, & Recovery|Cybercrime Prevention & Recovery]]</div>
[[File:Meerkat_colony_1.png|frameless|100px|center|link=Cybercrime Prevention, Reporting, & Recovery]]
! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;" |
<div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">[[Enhanced Protection|Enhanced Protection]]</div>
[[File:Rhinos.png|frameless|100px|center|link=Enhanced_Protection]]
|-
|-
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" |
<div style="position:relative; text-align:left; font-weight:normal; font-size: 75%; z-index: 1;">
* Understanding Top Threats
* Discovering Protection Tools
* Deciding How to Protect Yourself
</div>
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" |
<div style="position:relative; text-align:left; font-weight:normal; font-size: 75%; z-index: 1;">
* Navigate by Community
* Understanding Your Needs
* Locating Community Resources
</div>
! style="border: none; background-color: #FFFFFF; width:25%; text-align:left; vertical-align:middle; position:relative;"|
<div style="position:relative; text-align:left; font-weight:normal; font-size: 75%; z-index: 1;">
* Reporting Cybercrimes
* Preventing Recurrences
* Cybercrime Recovery Resources
</div>
! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;" |
<div style="position:relative; text-align:left; font-weight:normal; font-size: 75%; z-index: 1;">
* Understanding Cybersecurity Hygiene
* Finding Fundamental Tools
* Ensuring Basic Hygiene
</div>
|-
|}
|}
<div style="display: flex;">
<div style="display: flex;">

Revision as of 05:44, 30 January 2024

Curious fox 4.png
Bees-1.png
German-shepherds.png
Elephants.png
  • Use Strong & Unique Passwords
  • Enable Two Factor Authentication (2FA)
  • Be Cautious with Personal Information
  • Volunteer & Commercial Consultants
  • Managed Security Service Providers
  • Cybersecurity Training & Social Media
  • Moving Beyond the Basics
  • Assessing and Reducing Risks
  • Implementing Advanced Protection
You shouldn’t have to be a cybersecurity expert to have the tools to keep you safe. Actionable Cybersecurity Tools (ACT), an initiative by the Global Cyber Alliance (GCA) in partnership with Cyber Civil Defense (CCD) Initiative, is here to help individuals and communities find the right solutions for their protection needs. ACT is easy to use and anyone, regardless of their level of cybersecurity knowledge, can use it to understand risks and find tools to protect themselves, their family, or their organization.

GCA ACT Logo - Full Color.svg developed
by
GCA-Logo-web.png in partnership
with
Cyber Civil Defense Sept 2023.png