Update Your Defenses: Difference between revisions
From GCA ACT
Jump to navigationJump to search
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
{| class="wikitable" | {| class="wikitable" | ||
| style="width: 50%; vertical-align: top;" | | | style="width: 50%; vertical-align: top;" | | ||
[[File:ACT_Update_Your_Defenses_Icon.svg|frameless|35px|link=Update_Your_Defenses]] Updating defenses in the digital age is crucial to stay ahead of cyber threats. Cybersecurity professionals would suggest the following: | [[File:ACT_Update_Your_Defenses_Icon.svg|frameless|35px|link=Update_Your_Defenses]] Updating defenses in the digital age is crucial to stay ahead of cyber threats. Cybersecurity professionals would suggest the following: | ||
Line 15: | Line 14: | ||
| style="width: 50%; vertical-align: top;" | | | style="width: 50%; vertical-align: top;" | | ||
<strong>Cybersecurity Tools</strong> | <strong>Cybersecurity Tools</strong> | ||
{{#categorytree:Passwords|mode=collapsed}} | |||
{{#categorytree:Security Awareness & Training|mode=collapsed}} | |||
{{#categorytree:Email & Other Communications|mode=collapsed}} | |||
{{#categorytree:Anti-virus & Anti-malware Software|mode=collapsed}} | |||
{{#categorytree:Backup & Restoration of Data|mode=collapsed}} | |||
|} | |} |