Enhanced Protection: Difference between revisions

From GCA ACT
Jump to navigationJump to search
No edit summary
No edit summary
Line 1: Line 1:
{| class="wikitable" style="border: none; background-color: transparent; text-align: center;"
{| class="wikitable" style="border: none; background-color: transparent; text-align: center; width: 100%;"
|-
|-
| rowspan="2" style="vertical-align: middle; border: none;" | [[File:Rhinos.png|frameless|225px|link=Basic_Protection]]
| rowspan="2" style="vertical-align: middle; border: none;" | [[File:Rhinos.png|frameless|225px|link=Basic_Protection]]
| style="vertical-align: middle; border: none; text-align: center; align-items: center; justify-content: left;" | <div style="font-weight:bold; font-size:smaller;">Know What You Have<br>[[File:know-what-you-have.png|frameless|75px|link=Know_What_You_Have]]<div style="font-size:smaller; font-weight:normal; text-align:left;">Create an inventory to know what you need<br>to protect and to identify your risks:
| style="vertical-align: top; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="font-weight:bold;">Know What You Have<br><br>[[File:know-what-you-have.png|frameless|75px|link=Know_What_You_Have]]<div style="font-size:smaller; font-weight:normal; text-align:left;"><br>Create an inventory to know what you need to protect and to identify your risks:
#Identify your devices and accounts.
#Identify your devices and accounts.
#Identify your applications.
#Identify your applications.
#Identify your risks.
#Identify your risks.
</div></div><br><br>
</div></div>
| style="vertical-align: middle; border: none; text-align: center;" | <div style="display: flex; flex-direction: row-reverse; align-items: center; justify-content: left;"><div style="position:relative; font-weight:bold; font-size:smaller;">Update Your Defenses<br><div style="text-align:left; font-size:smaller;">Boost your digital immunity against threats such as<br>viruses by updating your systems regularly and securely:
| style="vertical-align: top; border: none; background-color: transparent; text-align: center; width: 25%;" | <div style="font-weight:bold;">Update Your Defenses<br><br>[[File:update-your-defenses.png|frameless|75px|link=Update_Your_Defenses]]<div style="text-align:left; font-size:smaller; font-weight:normal;"><br>Boost your digital immunity against threats by updating your systems regularly:
#Update your devices and applications.
#Update your devices and applications.
#Encrypt your data.
#Encrypt your data.
#Secure your websites.
#Secure your websites.
</div></div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[[File:update-your-defenses.png|frameless|75px|link=Update_Your_Defenses]]</div><br><br>
</div></div>
|-
| style="vertical-align: top; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="font-weight:bold;">Beyond Simple Passwords<br><br>[[File:beyond-simple-passwords.png|frameless|75px|link=Beyond_Simple_Passwords]]<div style="text-align:left; font-size:smaller; font-weight:normal;"><br>Level up your password game to protect your devices and accounts:
| style="vertical-align: middle; border: none; text-align: center;" | <div style="display: flex; align-items: center; justify-content: flex-end;"><div style="position:relative; font-weight:bold; font-size:smaller;">Beyond Simple Passwords<br><div style="text-align:left; font-size:smaller;">Level up your password game to<br>protect your devices and accounts:
#Use strong passwords.
#Use strong passwords.
#Setup 2FA.
#Setup 2FA.
#Manage your passwords.
#Manage your passwords.
</div></div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[[File:beyond-simple-passwords.png|frameless|75px|link=Beyond_Simple_Passwords]]&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</div><br><br>
</div></div>
|-
| style="vertical-align: middle; border: none; text-align: center;" | <div style="display: flex; flex-direction: row-reverse; align-items: center; justify-content: left;"><div style="position:relative; font-weight:bold; font-size:smaller;">Prevent Phishing & Malware<br><div style="text-align:left; font-size:smaller;">Stop malware and phishing attacks in their tracks<br>to avoid loss of funds and data, expensive<br>recovery costs, and damage to your reputation:
| style="vertical-align: middle; border: none; text-align: center;" | <div style="display: flex; flex-direction: row-reverse; align-items: center; justify-content: left;"><div style="position:relative; font-weight:bold; font-size:smaller;">Prevent Phishing & Malware<br><div style="text-align:left; font-size:smaller;">Stop malware and phishing attacks in their tracks<br>to avoid loss of funds and data, expensive<br>recovery costs, and damage to your reputation:
#Install Anti-Virus Software.
#Install Anti-Virus Software.
#Install an Ad Blocker.
#Install an Ad Blocker.
#Use DNS Security.
#Use DNS Security.
</div></div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[[File:prevent-phishing-malware.png|frameless|75px|link=Prevent_Phishing_&_Malware]]&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</div><br><br>
</div></div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[[File:prevent-phishing-malware.png|frameless|75px|link=Prevent_Phishing_&_Malware]]&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</div>
|-
|-
| style="vertical-align: middle; border: none; text-align: center;" | <div style="display: flex; align-items: center; justify-content: flex-end;"><div style="position:relative; font-weight:bold; font-size:smaller;">Backup & Recover<br><div style="text-align:left; font-size:smaller;">Say NO to Ransomware gangs and scammers<br>that lock your data and demand payment:
| style="vertical-align: middle; border: none; text-align: center;" | <div style="display: flex; align-items: center; justify-content: flex-end;"><div style="position:relative; font-weight:bold; font-size:smaller;">Backup & Recover<br><div style="text-align:left; font-size:smaller;">Say NO to Ransomware gangs and scammers<br>that lock your data and demand payment:

Revision as of 23:53, 6 August 2023

Rhinos.png
Know What You Have

File:Know-what-you-have.png

Create an inventory to know what you need to protect and to identify your risks:
  1. Identify your devices and accounts.
  2. Identify your applications.
  3. Identify your risks.
Update Your Defenses

File:Update-your-defenses.png

Boost your digital immunity against threats by updating your systems regularly:
  1. Update your devices and applications.
  2. Encrypt your data.
  3. Secure your websites.
Beyond Simple Passwords

File:Beyond-simple-passwords.png

Level up your password game to protect your devices and accounts:
  1. Use strong passwords.
  2. Setup 2FA.
  3. Manage your passwords.
Prevent Phishing & Malware
Stop malware and phishing attacks in their tracks
to avoid loss of funds and data, expensive
recovery costs, and damage to your reputation:
  1. Install Anti-Virus Software.
  2. Install an Ad Blocker.
  3. Use DNS Security.
     File:Prevent-phishing-malware.png             
Backup & Recover
Say NO to Ransomware gangs and scammers
that lock your data and demand payment:
  1. Setup backups for your important data.
  2. Learn how to restore your data.
  3. Encrypt your backups.
     File:Backup-recover.png
Protect Your Email & Reputation
Protect your reputation and secure your
e-mail against those who mean you harm:
  1. Setup junk mail filtering.
  2. Protect your social media accounts.
  3. Consider identity, credit, and title monitoring.
     File:Protect-email-reputation.png