Actionable Cybersecurity Tools (ACT) - Simplified Cybersecurity Protection: Difference between revisions

From GCA ACT
Jump to navigationJump to search
No edit summary
No edit summary
Line 12: Line 12:
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;"|
! style="border: none; background-color: #EBEBEB; width:25%; text-align:center; vertical-align:top; position:relative;"|
<div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">Unsure What You Need?</div>
<div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">Unsure What You Need?</div>
[[File:Inquisitive_raven_2.png|frameless|100px|center|link=Need_Help?]]
[[File:Wolf_spider_crawling.png|frameless|100px|center|link=Cybercrime Recovery]]
|-
|-
! style="border: none; background-color: transparent; width:25%; text-align:center; vertical-align:top; position:relative;" |
! style="border: none; background-color: transparent; width:25%; text-align:center; vertical-align:top; position:relative;" |

Revision as of 01:33, 26 August 2023

Everyday Cybersecurity
Curious fox 4.png
High Risk Communities
Bees-1.png
Get Help
German-shepherds.png
Unsure What You Need?
Wolf spider crawling.png
  • Use SSO, Strong Passwords, & 2FA
  • Install Antivirus & VPN Software
  • Automate Device & Software Updates
  • Volunteer & Commercial Consultants
  • Managed Security Service Providers
  • Cybersecurity Training & Social Media
Ask Here
Find Your Community
Owls.png
Top Threats
Stalking-hyenas.png
Basic Protection
Rhinos.png
Advanced Protection
Elephants.png
  • Navigate by Community
  • Understanding Your Needs
  • Locating Community Resources
  • Understanding Top Threats
  • Discovering Protection Tools
  • Deciding How to Protect Yourself
  • Understanding Cybersecurity Hygiene
  • Finding Fundamental Tools
  • Ensuring Basic Hygiene
  • Moving Beyond the Basics
  • Assessing and Reducing Risks
  • Implementing Advanced Protection