Enhanced Protection: Difference between revisions

From GCA ACT
Jump to navigationJump to search
(Created page with "Strong Passwords & Multi-Factor Authentication: Use complex, unique passwords for each account and consider two-factor authentication. Regular Software Updates: Keep operating systems, applications, and security software up to date to patch vulnerabilities. Phishing Awareness: Educate users about identifying and avoiding suspicious emails and links. Data Encryption: Protect sensitive information with encryption techniques to prevent unauthorized access. Regular Data...")
 
No edit summary
 
(35 intermediate revisions by the same user not shown)
Line 1: Line 1:
Strong Passwords & Multi-Factor Authentication: Use complex, unique passwords for each account and consider two-factor authentication.
{| class="wikitable" style="border: none; background-color: transparent; text-align: center; width: 100%;"
 
|-
Regular Software Updates: Keep operating systems, applications, and security software up to date to patch vulnerabilities.
| rowspan="2" style="vertical-align: middle; border: none;" | [[File:Rhinos.png|frameless|225px|link=Enhanced_Protection]]
 
| style="vertical-align: top; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="font-weight:bold;">Know What You Have<br><br>[[File:ACT_KnowWhat_YouHave_Icon.svg|frameless|75px|link=Know_What_You_Have]]<div style="font-size:smaller; font-weight:normal; text-align:left;"><br>Create an inventory to know what you need to protect and to identify your risks:<br><br>
Phishing Awareness: Educate users about identifying and avoiding suspicious emails and links.
#Identify your devices and accounts.
 
#Identify your applications.
Data Encryption: Protect sensitive information with encryption techniques to prevent unauthorized access.
#Identify your risks.
 
</div></div>
Regular Data Backups: Create backups of critical data to minimize the impact of data loss incidents.
| style="vertical-align: top; border: none; background-color: transparent; text-align: center; width: 25%;" | <div style="font-weight:bold;">Update Your Defenses<br><br>[[File:ACT_Update_Your_Defenses_Icon.svg|frameless|75px|link=Update_Your_Defenses]]<div style="text-align:left; font-size:smaller; font-weight:normal;"><br>Boost your digital immunity against threats by updating your systems regularly:<br><br>
 
#Update your devices and applications.
Inventory: Maintain an inventory of hardware, software, and network resources to track and manage cybersecurity measures.
#Encrypt your data.
 
#Secure your websites.
Single Sign-On (SSO): Reduce your login frequency.
</div></div>
| style="vertical-align: top; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="font-weight:bold;">Beyond Simple Passwords<br><br>[[File:ACT_BeyondSimplePasswords_Icon.svg|frameless|75px|link=Beyond_Simple_Passwords]]<div style="text-align:left; font-size:smaller; font-weight:normal;"><br>Level up your password game to protect your devices and accounts:<br><br>
#Use strong passwords.
#Setup 2FA.
#Manage your passwords.
</div></div>
|-
| style="vertical-align: top; border: none; background-color: transparent; text-align: center; width: 25%;" | <div style="font-weight:bold;">Prevent Phishing & Malware<br><br>[[File:ACT_Prevent_Phishing_Malware_Icon.svg|frameless|75px|link=Prevent_Phishing_&_Malware]]<div style="font-size:smaller; font-weight:normal; text-align:left;"><br>Stop malware and phishing attacks in their tracks to avoid loss of funds and data, expensive recovery costs, and damage to your reputation:<br><br>
#Install Anti-Virus Software.
#Install an Ad Blocker.
#Use DNS Security.
</div></div>
| style="vertical-align: top; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="font-weight:bold;">Backup & Recover<br><br>[[File:ACT_Backup_Recover_Icon.svg|frameless|75px|link=Backup_Recover]]<div style="text-align:left; font-size:smaller; font-weight:normal;"><br>Say NO to Ransomware gangs and scammers that lock your data and demand payment:<br><br>
#Setup backups for your important data.
#Learn how to restore your data.
#Encrypt your backups.
</div></div>
| style="vertical-align: top; border: none; background-color: transparent; text-align: center; width: 25%;" | <div style="font-weight:bold;">Protect Your Email & Reputation<br><br>[[File:ACT_Protect_Email_Reputation_Icon.svg|frameless|75px|link=Protect_Your_Email_&_Reputation]]<div style="text-align:left; font-size:smaller; font-weight:normal;"><br>Protect your reputation and secure your e-mail against those who mean you harm:<br><br>
#Setup junk mail filtering.
#Protect your social media accounts.
#Consider identity, credit, and title monitoring.
</div></div>
|}

Latest revision as of 05:00, 30 January 2024

Rhinos.png
Know What You Have

ACT KnowWhat YouHave Icon.svg

Create an inventory to know what you need to protect and to identify your risks:

  1. Identify your devices and accounts.
  2. Identify your applications.
  3. Identify your risks.
Update Your Defenses

ACT Update Your Defenses Icon.svg

Boost your digital immunity against threats by updating your systems regularly:

  1. Update your devices and applications.
  2. Encrypt your data.
  3. Secure your websites.
Beyond Simple Passwords

ACT BeyondSimplePasswords Icon.svg

Level up your password game to protect your devices and accounts:

  1. Use strong passwords.
  2. Setup 2FA.
  3. Manage your passwords.
Prevent Phishing & Malware

ACT Prevent Phishing Malware Icon.svg

Stop malware and phishing attacks in their tracks to avoid loss of funds and data, expensive recovery costs, and damage to your reputation:

  1. Install Anti-Virus Software.
  2. Install an Ad Blocker.
  3. Use DNS Security.
Backup & Recover

ACT Backup Recover Icon.svg

Say NO to Ransomware gangs and scammers that lock your data and demand payment:

  1. Setup backups for your important data.
  2. Learn how to restore your data.
  3. Encrypt your backups.
Protect Your Email & Reputation

ACT Protect Email Reputation Icon.svg

Protect your reputation and secure your e-mail against those who mean you harm:

  1. Setup junk mail filtering.
  2. Protect your social media accounts.
  3. Consider identity, credit, and title monitoring.