NewMain: Difference between revisions

From GCA ACT
Jump to navigationJump to search
No edit summary
No edit summary
 
(9 intermediate revisions by the same user not shown)
Line 1: Line 1:
{| class="wikitable" style="border: none; background-color: transparent; width: 100%;"
{| class="wikitable" style="border: none; background-color: transparent; width: 100%;"
|-
|-
! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;" |
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" |
<div style="position:relative; text-align:center; font-weight:bold; font-size:150%; z-index: 1;">[[Everyday Cybersecurity|Everyday Cybersecurity]]<br><br></div>
<div style="position:relative; text-align:center; font-weight:bold; font-size:150%; z-index: 1;">[[Everyday Cybersecurity|Everyday Cybersecurity]]<br><br></div>
[[File:Curious_fox_4.png|frameless|150px|center|link=Everyday_Cybersecurity]]
[[File:Curious_fox_4.png|frameless|175px|center|link=Everyday_Cybersecurity]]
! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;"|
<div style="position:relative; text-align:center; font-weight:bold; font-size:150%; z-index: 1;">[[High Risk Communities|High Risk Communities]]<br><br></div>
[[File:bees-1.png|frameless|175px|center|link=High_Risk_Communities]]
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;"|
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;"|
<div style="position:relative; text-align:center; font-weight:bold; font-size:150%; z-index: 1;">[[High Risk Communities|High Risk Communities]]<br><br></div>
[[File:bees-1.png|frameless|150px|center|link=High_Risk_Communities]]
! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;"|
<div style="position:relative; text-align:center; font-weight:bold; font-size:150%; z-index: 1;">[[Get Help|Get Help]]<br><br></div>
<div style="position:relative; text-align:center; font-weight:bold; font-size:150%; z-index: 1;">[[Get Help|Get Help]]<br><br></div>
[[File:german-shepherds.png|frameless|150px|center|link=Get_Help]]
[[File:german-shepherds.png|frameless|175px|center|link=Get_Help]]
! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;" |
<div style="position:relative; text-align:center; font-weight:bold; font-size:150%; z-index: 1;">[[Advanced Security|Advanced Security]]<br><br></div>
[[File:Elephants.png|frameless|175px|center|link=Advanced_Security]]
|-
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" |
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" |
<div style="position:relative; text-align:center; font-weight:bold; font-size:150%; z-index: 1;">[[Advanced Security|SLIDESHOW PLACEHOLDER]]<br><br></div>
[[File:Elephants.png|frameless|150px|center|link=Advanced_Security]]
|-
! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;" |
<div style="position:relative; text-align:left; font-weight:normal; font-size: 100%; z-index: 1;">
<div style="position:relative; text-align:left; font-weight:normal; font-size: 100%; z-index: 1;">
* Use Strong & Unique Passwords
* Use Strong & Unique Passwords
Line 20: Line 20:
* Be Cautious with Personal Information
* Be Cautious with Personal Information
</div>
</div>
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" |
! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;" |
<div style="position:relative; text-align:left; font-weight:normal; font-size: 100%; z-index: 1;">
<div style="position:relative; text-align:left; font-weight:normal; font-size: 100%; z-index: 1;">
* [[Parents & Families|Parents & Families]], [[Small & Medium Sized Businesses|SMBs]], [[High Risk Communities|and MORE.]]
* [[Parents & Families|Parents & Families]], [[Small & Medium Sized Businesses|SMBs]], [[High Risk Communities|and MORE.]]
Line 26: Line 26:
* [mailto:ccd@globalcyberalliance.org?subject=ACT%20Community%20Suggestion Suggest a Community]
* [mailto:ccd@globalcyberalliance.org?subject=ACT%20Community%20Suggestion Suggest a Community]
</div>
</div>
! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;" |
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" |
<div style="position:relative; text-align:left; font-weight:normal; font-size: 100%; z-index: 1;">
<div style="position:relative; text-align:left; font-weight:normal; font-size: 100%; z-index: 1;">
* Volunteers, Consultants, and MSSPs
* Volunteers, Consultants, and MSSPs
Line 32: Line 32:
* Cybersecurity Training & Social Media
* Cybersecurity Training & Social Media
</div>
</div>
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;" |
! style="border: none; background-color: #FFFFFF; width:25%; text-align:center; vertical-align:top; position:relative;" |
<div style="position:relative; text-align:left; font-weight:normal; font-size: 100%; z-index: 1;">
<div style="position:relative; text-align:left; font-weight:normal; font-size: 100%; z-index: 1;">
* Moving Beyond the Basics
* Moving Beyond the Basics
Line 44: Line 44:
       {|  style="border: none; text-align: center; width: 100%;"
       {|  style="border: none; text-align: center; width: 100%;"
       |-
       |-
       | style="border: none; background-color: transparent;" colspan="5";" | <span style="font-size: 150%; font-weight: bold;"><br>You shouldn’t have to be a cybersecurity expert to have the tools to stay safe.</span><br><br><span style="font-size: 100%; font-weight: bold;">Actionable Cybersecurity Tools (ACT), an initiative by the Global Cyber Alliance (GCA) in partnership with Cyber Civil Defense (CCD) Initiative, is here to help individuals and communities find the right solutions for their protection needs. ACT is easy to use and anyone, regardless of their level of cybersecurity knowledge, can use it to understand risks and find tools to protect themselves, their family, or their organization.</span><br><br>
       | style="border: none; background-color: transparent;" colspan="5";" | <span style="font-size: 135%; font-weight: bold;"><br>You don’t have to be a cybersecurity expert to have the tools to stay safe.</span><br><br><span style="font-size: 100%; font-weight: bold;">Actionable Cybersecurity Tools (ACT), an initiative by the Global Cyber Alliance (GCA) in partnership with Cyber Civil Defense (CCD) Initiative, is here to help individuals and communities find the right solutions for their protection needs. ACT is easy to use and anyone, regardless of their level of cybersecurity knowledge, can use it to understand risks and find tools to protect themselves, their family, or their organization.</span><br><br>
       |-
       |-
       | style="width: 30%; text-align: right;" |[[File:GCA_ACT_Logo_-_Full_Color.svg|frameless|210px|link=https://act.globalcyberalliance.org/]]
       | style="width: 30%; text-align: right;" |[[File:GCA_ACT_Logo_-_Full_Color.svg|frameless|210px|link=https://act.globalcyberalliance.org/]]

Latest revision as of 21:55, 31 January 2024

Curious fox 4.png
Bees-1.png
German-shepherds.png
Elephants.png
  • Use Strong & Unique Passwords
  • Enable Two Factor Authentication (2FA)
  • Be Cautious with Personal Information
  • Volunteers, Consultants, and MSSPs
  • Cybercrime Victims: Reporting & Recovery
  • Cybersecurity Training & Social Media
  • Moving Beyond the Basics
  • Assessing and Reducing Risks
  • Implementing Advanced Protection

You don’t have to be a cybersecurity expert to have the tools to stay safe.


Actionable Cybersecurity Tools (ACT), an initiative by the Global Cyber Alliance (GCA) in partnership with Cyber Civil Defense (CCD) Initiative, is here to help individuals and communities find the right solutions for their protection needs. ACT is easy to use and anyone, regardless of their level of cybersecurity knowledge, can use it to understand risks and find tools to protect themselves, their family, or their organization.

GCA ACT Logo - Full Color.svg developed
by
GCA-Logo-web.png in partnership
with
Cyber Civil Defense Sept 2023.png